Vanishing points are valuable in many vision tasks such as orientation estimation, pose recovery and 3D reconstruction from a single image. Many methods have been proposed to addr...
—Distributed Denial-of-Service (DDoS) attacks have become a major threat to the Internet. As a countermeasure against DDoS attacks, IP traceback schemes identify the network path...
— Multicast-based data communication is an efficient communication scheme especially in multihop ad hoc networks where the MAC layer is based on one-hop broadcast from one sourc...
—This work presents chemical communication techniques for nanorobots foraging in fluid environments relevant for medical applications. Unlike larger robots, viscous forces and ra...
Adriano Cavalcanti, Tad Hogg, Bijan Shirinzadeh, H...
— The BitTorrent (BT) file sharing protocol is popular due to its scalability property and the incentive mechanism to reduce free-riding. However, in designing such P2P file sh...