An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...
This research explores distributed sensing techniques for mobile devices using synchronous gestures. These are patterns of activity, contributed by multiple users (or one user wit...
Abstract. We investigate the performance of two approaches for matrix inversion based on Gaussian (LU factorization) and Gauss-Jordan eliminations. The target architecture is a cur...
Peter Benner, Pablo Ezzatti, Enrique S. Quintana-O...
A geometric approach to the computation of precise or well approximated tolerance zones for CAD constructions is given. We continue a previous study of linear constructions and fr...
Helmut Pottmann, Boris Odehnal, Martin Peternell, ...
This paper proposes a hybrid control method of using the impedance control and the computed-torque control for biped robot locomotion. The computedtorque control is used for suppo...