The ability to fly at low altitude while actively avoiding collisions with the terrain and other objects is a great challenge for small unmanned aircraft. This paper builds on top ...
Jean-Christophe Zufferey, Antoine Beyeler, Dario F...
Search engines not only assist normal users, but also provide information that hackers and other malicious entities can exploit in their nefarious activities. With carefully craft...
Real-time scheduling theory has made a great progress in the last decades. From small devices to enormous satellites or industrial plants take advantage of this ongoing research. H...
A neural net with multiple output nodes is capable of distinguishing among a set of related input classes even in the absence of training. It can do so with an accuracy that is ma...
Abstract--Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take ...