Law at large underpins modern society, codifying and governing many aspects of citizens' daily lives.
PROGRAMMING LANGUAGES
In this study, we propose a navigation system that is operable on a low-end computer with an RGB-D camera and a mobile robot platform for the operation of an integrated autonomous driving system.
ROBOTICS SYSTEMS AND CONTROL SYSTEMS AND CONTROL
In particular, OF aims to ensure finder anonymity, untrackability of owner devices, and confidentiality of location reports.
CRYPTOGRAPHY AND SECURITY NETWORKING AND INTERNET ARCHITECTURE
In High Energy Physics facilities that provide High Performance Computing environments provide an opportunity to efficiently perform the statistical inference required for analysis of data from the Large Hadron Collider, but can pose problems with orchestration and efficient scheduling.
DISTRIBUTED, PARALLEL, AND CLUSTER COMPUTING HIGH ENERGY PHYSICS - EXPERIMENT
This article discusses the decoding of Gabidulin codes and shows how to extend the usual decoder to any supercode of a Gabidulin code at the cost of a significant decrease of the decoding radius.
CRYPTOGRAPHY AND SECURITY INFORMATION THEORY INFORMATION THEORY
Notwithstanding the growing presence of AGVs in the industry, there is a lack of research about multi-wheeled AGVs which offer higher maneuverability and space efficiency.
ROBOTICS
Despite constant improvements in efficiency, today's data centers and networks consume enormous amounts of energy and this demand is expected to rise even further.
DISTRIBUTED, PARALLEL, AND CLUSTER COMPUTING
However, streaming 360{\deg} videos require high bandwidth, thus escalating the need for developing optimized streaming algorithms.
MULTIMEDIA
Our approach determines that GumTree, MTDiff and IJM generate inaccurate mappings for 20%--29%, 25%--36% and 21%--30% of the file revisions, respectively.
SOFTWARE ENGINEERING
This problem has two variants: EA-testing deals with figuring out whether the two functions can be EA-equivalent, and EA-recovery is about recovering the tuple $(A, B, C)$ if it exists.
CRYPTOGRAPHY AND SECURITY DISCRETE MATHEMATICS INFORMATION THEORY INFORMATION THEORY