Consider a matrix valued function A(x) ∈ Rm×n , m ≥ n, smoothly depending on parameters x ∈ Ω ⊂ R2 , where Ω is simply connected and bounded. We consider a technique t...
Luca Dieci, Maria Grazia Gasparo, Alessandra Papin...
— In this paper, the user experience in added value location-based mobile music service called the City Night Life (CNL) is evaluated and analyzed. The CNL service provides recom...
Location estimation is an important part of many ubiquitous computing systems. Particle filters are simulation-based probabilistic approximations which the robotics community has ...
Software change requests are often formulated as requests to modify or to add a specific feature or concept. To implement these changes, the features or concepts must be located i...
Network Denial of Service (DoS) attacks are increasing in frequency, severity and sophistication, making it desirable to measure the resilience of systems to DoS attacks. In this p...
Yan Chen, Adam W. Bargteil, David Bindel, Randy H....