—In this paper we present a novel interactive method and interface techniques for controlling the behavior of physically-based simulation of deformable objects. The goal of our r...
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
Abstract. The RoboCup Simulator League provides an excellent platform for research on swarm computing. Our research focuses on group behaviors emerge from collections of actors mak...
Keen Browne, Jon McCune, Adam Trost, David Evans, ...
We present a new localization algorithm called Sensor Resetting Localization which is an extension of Monte Carlo Localization. The algorithm adds sensor based resampling to Monte...
It has been shown that IEEE 802.11 DCF medium access control (MAC) protocol may not be suitable for multihop wireless networks due to its relatively low throughput and severely un...