— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
— In this paper, we address the problem of learning 3D maps of the environment using a cheap sensor setup which consists of two standard web cams and a low cost inertial measurem...
Bastian Steder, Giorgio Grisetti, Slawomir Grzonka...
— In applications such as space and surgical robotics, the use of thin, lightweight manipulators and cable-driven endeffectors results in flexibility of the manipulator. In bila...
— For the design of an automated transportation system in an actual seaport container terminal, it is necessary to take into consideration the maintenance of operating robots (AG...
Prostate cancer treatment by radiation therapy requires an accurate localisation of the prostate. For the treatment planning, primarily computed tomography (CT) images are used, b...
Stefan Klein, Uulke A. van der Heide, Bas W. Raaym...