Equivocation has been widely used as a measure of security after Shannon[10]. For an infinite system such as the wiretap channel defined in [2], equivocation is unbounded and so e...
Recovering multiple point light sources from a sparse set of photographs in which objects of unknown texture can move is challenging. This is because both diffuse and specular ref...
In this paper we evaluate the effectiveness of agent-based aiding in support of a time-critical team-planning task for teams of both humans and heterogeneous software agents. The ...
Terry R. Payne, Terri L. Lenox, Susan Hahn, Michae...
In this paper, we present 3D offline path planner for Unmanned Aerial Vehicles (UAVs) using Multiobjective Evolutionary Algorithms for finding solutions corresponding to conflictin...
Mobile B2E-applications (business-to-employee) can add significant value to a company's business, when large workforce divisions are involved in the execution of certain busi...