One of the key requirements of augmented reality systems is a robust real-time camera pose estimation. In this paper we present a robust approach, which does neither depend on of...
CSMA-based MAC protocols require wireless nodes to share the transmission medium with other nodes that are within carriersensing (CS) range. Hence, operations that depend on and c...
Kimaya Sanzgiri, Ian D. Chakeres, Elizabeth M. Bel...
Network traffic matrices are important for various network planning and management operations. Previous work for estimation of traffic matrices is based on either link load record...
Introducing mobile data sinks into wireless sensor networks (WSNs) improves the energy efficiency and the network lifetime, and is demanded for many application scenarios, such a...
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruc...