We summarise several techniques in use in our visual robotics research. Our aim is to develop robots that are thoroughly autonomous and adaptable. We describe a system that is ind...
False path analysis is an activity with applications in a variety of computer science and engineering domains like for instance high-level synthesis, worst case execution time est...
The Satisfactory Partition problem consists of deciding if a given graph has a partition of its vertex set into two nonempty parts such that each vertex has at least as many neighb...
This paper analyzes both the strong points and weak points of OSPF routing protocol from security perspective. On its strong points, we abstract its features of information least ...
Our paper present a watermarking scheme basing on an insertion of similarities. In a rst part di erent watermarking techniques are presented and classed. In a second part our sche...