— IP-based solutions to accommodate mobile hosts within existing internetworks do not address the distinctive features of wireless mobile computing. IP-based transport protocols ...
We present a systematic procedure for selecting facial fiducial points associated with diverse structural characteristics of a human face. We identify such characteristics from th...
Shalini Gupta, J. K. Aggarwal, Mia K. Markey, Alan...
— For controlling robots in an urban search and rescue (USAR) application, we present a wearable joystick with improved sensing capability as well as Giant MagnetoResistance(GMR)...
Jaewook Bae, Amy C. Larson, Richard M. Voyles, Roy...
Many volume data possess symmetric features that can be clearly observed, for example, those existing in diffusion tensor image data sets. The exploitations of symmetries for volu...
This paper presents the language Lutin and its operational semantics. This language specifically targets the domain of reactive systems, where an execution is a (virtually) infini...