Abstract— It has previously been shown that serially concatenated trellis coded modulation (SCTCM) with a non-recursive inner convolutional code can achieve convergence close to ...
Storage systems are increasingly subject to attacks. Cryptographic file systems mitigate the danger of exposing data by using encryption and integrity protection methods and guar...
Using additional store-checkpoinsts (SCPs) and compare-checkpoints (CCPs), we present an adaptive checkpointing for double modular redundancy (DMR) in this paper. The proposed app...
This paper challenges current practices in the use of digital media to communicate Australian Aboriginal knowledge practices in a learning context. It proposes that any digital re...
— The presence of humans should be explicitly taken into account in all steps of robot’s design and particularly for robot motion. The robot should reason about human partner...
Emrah Akin Sisbot, Luis Felipe Marin, Rachid Alami...