Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
The steady-state throughput of general network coding node is investigated, when data is transmitted in packets based on the stopand-wait automatic repeat request (SW-ARQ) error-co...
— This paper describes a method of probabilistic obstacle map building based on Bayesian estimation. Most active or passive obstacle sensors observe only the most frontal objects...
This paper presents a low-cost and practical approach to achieve basic input using a tactile cube-shaped object, augmented with a set of sensors, processor, batteries and wireless...
Kristof Van Laerhoven, Nicolas Villar, Albrecht Sc...
A plethora of random graph models have been developed in recent years to study a range of problems on networks, driven by the wide availability of data from many social, telecommu...