As the ability to produce a large number of small, simple robotic agents improves, it becomes essential to control the behavior of these agents in such a way that the sum of their...
In this paper, we introduce new concepts and methods for checking the correctness of control flow instructions during the execution of programs in embedded CPUs. Detecting and avoi...
Cryptanalysis of symmetric and asymmetric ciphers is a challenging task due to the enormous amount of involved computations. To tackle this computational complexity, usually the e...
: This paper presents the networking architecture developed in the CASCOM research project. This architecture provides an efficient and reliable communication support and service d...
Heikki Helin, Tim Van Pelt, Michael Schumacher, Ah...
This paper presents a self-calibration technique for a camera mounted on an underwater vehicle designed to perform the 3D reconstruction of underwater scenes. Our aim is to identi...