Lasers can be used by hackers to situations to inject faults in circuits and induce security flaws. On-line detection mechanisms are classically proposed to counter such attacks, ...
Consider a collection of random variables attached to the vertices of a graph. The reconstruction problem requires to estimate one of them given ‘far away’ observations. Sever...
- This paper presents a unique approach for a model-based admission control algorithm for the IEEE 802.11e Enhanced Distributed Channel Access (EDCA) standard. The analytical model...
Neurons in the nervous system display a wide variety of plasticity processes. Among them are covariance based rules and homeostatic plasticity. By themselves, the first ones tend...
In this paper, we discuss usage of a multi-stage Residual Vector Quantization (RVQ) strategy for human action recognition. To the best of our knowledge, this is the first reported...
Salman Aslam, Christopher F. Barnes, Aaron F. Bobi...