This paper considers time-varying uncertain constrained systems, and develops a method for computing a probabilistic output admissible (POA) set. This set consists of the initial ...
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Technology-enhanced or Computer Aided Learning (e-learning) can be institutionally integrated and supported by learning management systems or Virtual Learning Environments (VLEs) ...
Shafqat Hameed, John Mellor, Atta Badii, Niyati Pa...
The tangential neurons in the lobula plate region of the flies are known to respond to visual motion across broad receptive fields in visual space. When intracellular recordings ar...
Patrick A. Shoemaker, David C. O'Carroll, A. D. St...
We present a compressed domain scheme that is able to recognize and localize actions in real-time1 . The recognition problem is posed as performing an action video query on a test ...