This paper presents a character-structure-guided approach to estimating possible orientations of a rotated isolated online handwritten Chinese character. Using the estimated orien...
This paper discusses measures to make a distributed system based on the Time-Triggered Architecture resistant to arbitrary node failures. To achieve this, the presented approach i...
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
The basic idea behind cloud computing is that resource providers offer elastic resources to end users. In this paper, we intend to answer one key question to the success of cloud c...
Abstract—The seismic response of bridges seismically isolated by lead-rubber bearings (LRB) to earthquake excitations of different magnitudes is presented in this thesis. The fo...