Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages...
In this paper we introduce a formalism for optimal camera parameter selection for iterative state estimation. We consider a framework based on Shannon’s information theory and se...
Joachim Denzler, Christopher M. Brown, Heinrich Ni...
Algorithmic methods based on the theory of fixed-parameter tractability are combined with powerful computational platforms to launch systematic attacks on combinatorial problems o...
Faisal N. Abu-Khzam, Michael A. Langston, Pushkar ...
-- This paper presents the theoretical analysis and the experimental validation of the force sensing capabilities of continuum robots. These robots employ super-elastic NiTi backbo...
Many recent works that study the performance of multi-input multi-output (MIMO) systems in practice assume a Kronecker model where the variances of the channel entries, upon decom...
Vasanthan Raghavan, Jayesh H. Kotecha, Akbar M. Sa...