Legacy applications can be difficult and time-consuming to understand and update due to the lack of modern abstraction mechanisms in legacy languages, as well as the gradual dete...
Abstract—The wavelet entropy (WE) of rest electroencephalogram (EEG) and of event-related potentials (ERP) carries information about the degree of order or disorder associated wi...
Giorgos A. Giannakakis, Nikolaos N. Tsiaparas, Mon...
Abstract— We explore an algorithm and methodology for realtime video compression and communication over sensor network. Video is encoded using the address-event representation (A...
Eugenio Culurciello, Joon Hyuk Park, Andreas Savvi...
Abstract. The majority of research in control engineering considers periodic or time-triggered control systems with equidistant sample intervals. However, practical cases abound in...
J. H. Sandee, W. P. M. H. Heemels, P. P. J. van de...
Abstract. An extension of the λ-calculus is proposed to study historybased access control. It allows for parametrized security policies with a possibly nested, local scope. To gov...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...