— Experiments in real satellite testbeds are relatively rare in practice. In this paper, we are going to share our experience on using one, and comment on selected sets of result...
Cesar Marcondes, Anders Persson, M. Y. Sanadidi, M...
Abstract - this paper proposes the use of a high-level architecture exploration method for different MPEG4 video encoders using different customization parameters. The targeted arc...
Marius Bonaciu, Aimen Bouchhima, Mohamed-Wassim Yo...
We describe Passpet, a tool that improves both the convenience and security of website logins through a combination of techniques. Password hashing helps users manage multiple acc...
On public communication networks such as the Internet, data confidentiality can be provided by symmetric-key ciphers. One of the most common operations used in symmetric-key ciphe...
- In this paper, we describe the mechanical design, system integration and dynamic walking of the humanoid, KHR-2 (KAIST Humanoid Robot–2). KHR-2 has 41 DOFs in total, that allow...
Jung-Yup Kim, Ill-Woo Park, Jungho Lee, Min-Su Kim...