Wireless sensor networks (WSNs) are hard to program due to unconventional programming models used to satisfy stringent resource constraints. The common event-driven concurrent pro...
Vinaitheerthan Sundaram, Patrick Th. Eugster, Xian...
Future systems will have to support multiple and concurrent dynamic compute-intensive applications, while respecting real-time and energy consumption constraints. With the increase...
Nicolas Ventroux, Alexandre Guerre, Tanguy Sassola...
In this paper, we address the problem of visually guiding and controlling a robot in projective three-space using stereo vision. As the proposed method is entirely formulated in pr...
Multi-detector Computed Tomography offers the promise of a non-invasive alternative to invasive coronary angiography for the evaluation of coronary artery disease. An impediment p...
Zhuangli Liang, W. Clem Karl, Synho Do, Thomas Bra...
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...