Person identification and verification using biometric methods is getting more and more important in today’s information society; resulting in increased utilization of systems th...
Use cases are often perceived as an integral part of an objectoriented approach to software development, yet despite claims that objects fall naturally from the use case descripti...
This work is devoted to present the design and implementation of Alfa-1, a simulated computer with educational purposes. The DEVS formalism was used to attack the complexity of th...
In this paper a wave-pipelining scheme is used to increase the performance of a router architecture. Wave-pipelining has a potential of significantly reducing clock cycle time an...
This paper describes the application of a computational vision sensor to active binocular tracking. The sensor outputs are used to control the vergence angles of the two cameras a...