Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Abstract--A key design constraint of circuits used in handheld devices is the power consumption, mainly due to battery life limitations. Adaptive power management (APM) techniques ...
S. Saqib Khursheed, Urban Ingelsson, Paul M. Rosin...
The need for personalized summaries of media content has been driven by the recent and anticipated explosive growth in the media world. In this paper we present a methodology and ...
Lalitha Agnihotri, John R. Kender, Nevenka Dimitro...
This paper presents a novel multi-view camera system that produces real-time single view scene video which sees through the static objects to observe the dynamic objects. The syste...
Cell enumeration in peripheral blood smears and cell are widely applied in biological and pathological practice. Not every area in the smear is appropriate for enumeration due to ...
Wei Xiong, S. H. Ong, Christina Kang, Joo-Hwee Lim...