In today's hi-tech world, conventional physical security methods are simply insufficient for the protection of an organisation's information assets. This is because of t...
Internet servers need to be highly-available, inexpensive, and scalable. These goals are often con icting and most designs meet, with limited success, only few of them. In this pa...
This paper describes preliminary results from using an AI robot control software architecture, known as 3T, as the software framework for a procedure tracking system for the space...
Abstract. TTEthernet is a communication infrastructure for mixedcriticality systems that integrates dataflow from applications with different criticality levels on a single network...
Support Vector Machine (SVM) has been widely studied and shown success in many application fields. However, the performance of SVM drops significantly when it is applied to the pr...