In this paper, we develop an analytical framework to measure the vulnerability of superpeer networks against attack. Two different kinds of attacks namely deterministic and degre...
Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy ...
This paper presents a novel Energy-Aware Compilation (EAC) framework that can estimate and optimize energy consumption of a given code taking as input the architectural and techno...
Ismail Kadayif, Mahmut T. Kandemir, Narayanan Vija...
: This paper presents HyROOM, a proposal for an extension of UML-like languages by continuous activities for the specification of mixed discrete-continuous, or hybrid, systems. It...
Thomas Stauner, Alexander Pretschner, Istran P&eac...
Abstract—Traditional Dijkstra and Bellman-Ford routing algorithms can only provide the best route to each destination based on a fixed link cost model. We propose a utility-base...
— In real object manipulation, the deformation of the fingerpads along the contact surfaces provides local information about the geometry of the object the subject is manipulati...
Alessandro Formaglio, Gabriel Baud-Bovy, Domenico ...