The ubiquitous SSH package has demonstrated the importance of secure remote login and execution. As remote execution tools grow in popularity, users require new features and exten...
Michael Kaminsky, Eric Peterson, Daniel B. Giffin,...
Locality Sensitive Hashing (LSH) is widely used for efficient retrieval of candidate matches in very large audio, video, and image systems. However, extremely large reference dat...
—High-gain proportional–integral–derivative (PID) position control involves some risk of unsafe behaviors in cases of abnormal events, such as unexpected environment contacts...
Ryo Kikuuwe, S. Yasukouchi, Hideo Fujimoto, Motoji...
We extend the differential approach to inference in Bayesian networks (BNs) (Darwiche, 2000) to handle specific problems that arise in the context of dynamic Bayesian networks (D...
In order to deal with the heavy trend in size increase of volumetric datasets, research in isosurface extraction has focused in the past few years on related aspects such as surfa...
Guilhem Dupuy, Bruno Jobard, Sebastien Guillon, No...