—The paper presents the current state of research on developing a computer-assisted surgical trainer to be used in a minimally-invasive surgery training program. Along with wide ...
Ryszard Klempous, Jan Nikodem, Andrzej Wytyczak-Pa...
—We apply the synthesis method introduced in our previous work in order to synthesize from proofs certain algorithms operating on sorted lists without duplications (“monotone l...
Abstract—The multitude of hardware and software applications generate a lot of data and burden security solutions that must acquire informations from all these heterogenous syste...
— The idea of using mobile robots to different applications is very common today. For choosing the best hardware and software configuration for the mobile robot it is necessary i...
Tony Stanescu, Lucian Alexandru Sandru, Valer Dolg...
—The paper presents the design and the implementation of two model predictive controllers (MPCs) for magnetic levitation systems. The presentation is focused on the position cont...
—DHCP is one of the most used network protocols, despite the security issues it has. Our work is motivated by the numerous attacks that can be launched against DHCP and the impac...
—In this paper we perform an analysis of the main software methods for consumption reduction in real time systems (RTS). The study covers both scheduling methods and energy consu...
Cristina Stangaciu, Andreea M. Horvath, Mihai V. M...