Abstract— Climbing is a challenging task for autonomous mobile robots primarily due to requirements for agile locomotion, and high maneuverability as well as robust and efficient...
Image-Adaptive watermarking systems exploit visual models to adapt the watermark to local properties of the host image. This leads to a watermark power enhancement, hence an improv...
SRAM FPGAs are vulnerable to security breaches such as bitstream cloning, reverse-engineering, and tampering. Bitstream encryption and authentication are two most effective and pr...
We propose and develop an approach modeled with multi-attribute utility theory for sensor fusion in context-aware environments. Our approach is distinguished from existing general ...
Amir Padovitz, Seng Wai Loke, Arkady B. Zaslavsky,...
Abstract. A fundamental problem in the analysis of parallel programs is to determine when two statements in a program may run concurrently. This analysis is the parallel analog to ...