When its human operator cannot continuously supervise (much less teleoperate) an agent, the agent should be able to recognize its limitations and ask for help when it risks making...
Robert Cohn, Michael Maxim, Edmund H. Durfee, Sati...
—Today’s mobile networks prevent users from freely accessing all available networks. Instead, seamless network composition could present a win-win situation for both users and ...
Pongsakorn Teeraparpwong, Per Johansson, Harsha V....
We consider unbounded fanin depth-2 circuits with arbitrary boolean functions as gates. We define the entropy of an operator f : {0, 1}n → {0, 1}m as the logarithm of the maximu...
—We present an optimal distributed algorithm to adapt the placement of a single operator in high communication cost networks, such as a wireless sensor network. Our parameterfree...
Civilian applications for UAVs will bring these vehicles into low flying areas cluttered with obstacles such as building, trees, power lines, and more importantly civilians. The h...
The convergence of a time discretisation with variable time steps is shown for a class of doubly nonlinear evolution equations of second order. This also proves existence of a weak...
Abstract. The classical sampling theorem for bandlimited functions has recently been generalized to apply to so-called bandlimited operators, that is, to operators with band-limite...
Abstract--We propose an approach to accurately detecting twodimensional (2-D) shapes. The cross section of the shape boundary is modeled as a step function. We first derive a one-d...
To collect the information on devastated districts, it is effective to use helicopters. However, the operation using manned helicopters costs a lot. It is expected that the use of...
In 1990, J.L. Krivine introduced the notion of storage operator to simulate, for Church integers, the “call by value” in a context of a “call by name” strategy. In this pre...