The growing complexity of hardware optimizations employed by multiprocessors leads to subtle distinctions among allowed and disallowed behaviors, posing challenges in specifying th...
Sela Mador-Haim, Luc Maranget, Susmit Sarkar, Kayv...
This paper shows that the basic Hough transform is implicitly a Bayesian process--that it computes an unnormalized posterior distribution over the parameters of a single shape giv...
Neil Toronto, Bryan S. Morse, Dan Ventura, Kevin D...
The increasing popularity of mobile devices has fostered the development of visualization applications for these devices. However, the reduced screen size and different interactio...
Paulo Miguel Pombinho de Matos, Maria Beatriz Carm...
— A control strategy inspired by the hunting tactics of ladybugs is presented to simultaneously achieve sensor coverage and exploration of an area with a group of networked robot...
Mac Schwager, Francesco Bullo, David Skelly, Danie...
Abstract. This paper presents a critical analysis of the AACS drivehost authentication scheme. A few weaknesses are identified which could lead to various attacks on the scheme. I...