Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...
This paper presents a visual-servoing method that is based on 2-D ultrasound (US) images. The main goal is to guide a robot actuating a 2-D US probe in order to reach a desired cro...
It is known that Wideband Code-Division Multiple Access (W-CDMA) networks are limited by interference more than by any other single effect. Due to the frequency selectivity of the ...
We present an analytical, simulation, and experimental-based study of beamforming Multiple Input Single Output (MISO) systems. We analyze the performance of beamforming MISO syste...
Melissa Duarte, Ashutosh Sabharwal, Chris Dick, Ra...
Reliable estimation of visual saliency allows appropriate processing of images without prior knowledge of their content, and thus remains an important step in many computer vision ...
Ming-Ming Cheng, Guo-Xin Zhang, Niloy J. Mitra, Xi...