An obfuscation aims to transform a program, without affecting its functionality, so that some secret data within the program can be hidden for as long as possible from an adversar...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
Finding the right agents in a large and dynamic network to provide the needed resources in a timely fashion, is a long standing problem. This paper presents a method for informati...
Multimedia documents are collections of media objects, synchronized by means of sets of temporal and spatial constraints. Any multimedia document definition is valid as long as t...
Paola Bertolotti, Ombretta Gaggi, Maria Luisa Sapi...
— When industrial robot arms are controlled using sensor data the performance is dependent on the sensor sampling rate, on delays in signal processing, and on the robot dynamics....
Abstract. Many supervised and unsupervised learning algorithms depend on the choice of an appropriate distance metric. While metric learning for supervised learning tasks has a lon...