Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
Abstract This paper proposes an approach for reducing the computational complexity of a model-predictive-control strategy for discrete-time hybrid systems with discrete inputs only...
Bostjan Potocnik, Gasper Music, Igor Skrjanc, Boru...
In most vehicle simulators, complete physical mockups equipped with steering wheel, gearshift and pedals are required. These devices are essential in trying to simulate real condi...
Marcelo Kallmann, Patrick Lemoine, Daniel Thalmann...
This paper presents a system which learns from examples to automatically recognize people and estimate their poses in image sequences with the potential application to daily surve...
Grid computing provides key infrastructure for distributed problem solving in dynamic virtual organizations. It has been adopted by many scientific projects, and industrial intere...
Jim Blythe, Ewa Deelman, Yolanda Gil, Carl Kesselm...