For complex services, logging is an integral part of many middleware aspects, especially, transactions and monitoring. In the event of a failure, the log allows us to deduce the c...
Abstract— The 802.15.4 WSN standard provides optional reliability through positive acknowledgments. Since positive-ACKs are not designed for energy efficiency, there is significa...
— Target tracking has two variants that are often studied independently with different approaches: target searching requires a robot to find a target initially not visible, and ...
Information assurance in critical infrastructure is an issue that has been addressed generally focusing on real-time or quasi real-time monitoring of the critical infrastructure; ...
In this paper, we present a framework for immersive 3D video conferencing and geographically distributed collaboration. Our multi-camera system performs a full-body 3D reconstruct...
Gregorij Kurillo, Ramanarayan Vasudevan, Edgar J. ...