—User-level communication allows an application process to access the network interface directly. Bypassing the kernel requires that a user process accesses the network interface...
—In this paper, we propose an analytical technique to evaluate the statistics of the channel estimation error in a simple multi-user ad hoc networking scenario. This problem is v...
Abstract. This paper describes a preliminary work devoted to the design of a control architecture for a defective haptic interface, i.e. an underactuated haptic interface not able ...
In recent years, the emergence of the term IT Governance (ITG) has pointed to the increasing importance for business of effecting an alignment between its strategic direction and ...
Chi-Hoon Lee, Jung-Hoon Lee, Jong-Sung Park, Kap-Y...
Internet videos have grown exponentially with the help from video sharing websites. Automatic topic mining is therefore increasingly important for organizing and navigating such l...
Lu Liu, Yong Rui, Lifeng Sun, Bo Yang, Jianwei Zha...