Concurrency control mechanisms such as turn-taking, locking, serialization, transactional locking mechanism, and operational transformation try to provide data consistency when con...
Amir R. Razavi, Sotiris Moschoyiannis, Paul J. Kra...
This paper represents a description of our approach to the problem of topological localization of a mobile robot using visual information. Our method has been developed for ImageCL...
A major difficulty for anomaly detection lies in discovering boundaries between normal and anomalous behavior, due to the deficiency of abnormal samples in the training phase. In...
This paper presents a new approach for estimating the disparity search range in stereo video that enforces temporal consistency. Reliable search range estimation is very important...
Dongbo Min, Sehoon Yea, Zafer Arican, Anthony Vetr...
Sensor network MAC protocols typically sacrifice packet latency to achieve energy efficiency. Such delays may well increase due to routing protocol operation. For this reason it i...
Antonio G. Ruzzelli, Gregory M. P. O'Hare, Raja Ju...