Deterministic optimization approaches have been well developed and widely used in the process industry to accomplish off-line and on-line process optimization. The challenging tas...
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
The use of cellular data networks is increasingly popular due to the widespread deployment of 3G technologies and the rapid adoption of smartphones, such as iPhone and GPhone. Bes...
We describe a method designed to detect fluorescent rods from 2D microscopy images. It is motivated by the desire to study the dynamics of bacteria such as Shigella. The methodolo...
Bo Zhang, Jost Enninga, Jean-Christophe Olivo-Mari...
— Industrial plants makes a carefully trace of the human intervention on the process. This intervention happens at different points in the history of the facility, since the desi...