A wearable situational awareness terminal (WearSAT) that provides text, graphics, and video to an astronaut via a near-eye display, and acts as a client on a wireless network, has...
Christopher E. Carr, Steven J. Schwartz, Ilia Rose...
This paper describes how animat-based “food foraging” techniques may be applied to the design of low-level image processing algorithms. First, we show how we implemented the fo...
Enzo Bolis, Christian Zerbi, Pierre Collet, Jean L...
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection...
David Wagner, Jeffrey S. Foster, Eric A. Brewer, A...
We describe an algorithm for the synthesis and optimization of interface circuits for embedded system components such as microprocessors, memory ASIC, and network subsystems with ...
Abstract. W3C's OWL has gained wide acceptance in the agent community and it has already been used in many agent applications which we think syntactically. By taking advantage...