If you have any problems related to the accessibility of any content (or if you want to request that a specific publication be accessible), please contact (email@example.com). We will work to respond to each request in as timely a manner as possible.
Now showing items 1-7 of 7
Transceiver Selection for Multi-Element Free-Space-Optical Communications
The focus on wireless networking technologies has always been on radio frequency (RF). However, the capacity of these networks is limited by the availability of the RF spectrum. On the other hand, recent wireless applications ...
Using an Auction Behavior-Based Robotic Architecture in Order to Fulfill Necessary Functionality for Service Robotics
<bold>ABSTRACT</bold> Service robots have great potential for improving the quality of life and assisting with people's daily activities. Such robots must be capable of performing multiple tasks and schedule them ...
Application-Specific Topology-Independent Routing for Multi-hop Wireless Networks
Provisioning of rich routing building blocks to mobile ad-hoc networking applications has been of high interest. Several multi-hop wireless network applications need flexibility in describing paths their traffic will follow. ...
Efficient Object Detection and Tracking Using a Novel MSER-Based Approach
This dissertation introduces a novel, real-time, color-based, Maximally Stable Extremal Region (MSER) detection and tracking algorithm. Our algorithm combines MSER-evolution with image-segmentation to produce maximally-stable ...
A Separation-Based UI Architecture with a DSL for Role Specialization
This dissertation was aimed at creating a new software development method-ology centered on the natural role specialization characteristic of people. Based onexisting work in the field, we propose a unique separation-based ...
Models of Intention for Human-Robot Interaction
As demand for robots grows in non-industrial settings, there is acorresponding need to develop systems that engage with humans ona social level. A key component of this social interaction is theprocess of inferring humans' ...
Network Security Monitoring and Analysis based on Big Data Technologies
Network flow data provides valuable information to understand the network status and tobe aware of the network security threads. However, handling the large amount of datacollected from the network and providing real time ...