Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
It is strongly desired to construct multimedia databases especially of maps or engineering drawings. If these databases are intended to be used really effectively, original drawin...
This paper presents a region-representation scheme and comparative analysis methods based on a tesseral addressing system. The proposed scheme is described in the context of perfo...
Abstract. We describe a probabilistic reference disambiguation mechanism developed for a spoken dialogue system mounted on an autonomous robotic agent. Our mechanism performs proba...
: Performing dependability evaluation along with other analyses at architectural level allows both making architectural tradeoffs and predicting the effects of architectural decisi...
Ana-Elena Rugina, Peter H. Feiler, Karama Kanoun, ...