We present a new static analysis for reviewing the security of libraries for systems, such as JVMs or the CLR, that rely on stack inspection for access control. We describe its im...
This paper presents a rate control algorithm for the dominant discrete cosine transform (DCT) -based video coding. It is developed based on a more accurate rate-distortion (RD) mo...
Embodied artificial intelligence argues that the body and brain play equally important roles in the generation of adaptive behavior. An increasingly common approach therefore is to...
Abstract--With the rapid development of peer-to-peer networks, simulation is considered as a useful tool to demonstrate initial ideas before building prototypes with real network t...
— In this article a new method is presented to obtain a full and precise calibration of camera-robot systems with eyein-hand cameras. It achieves a simultaneous and numerically s...