![]() ![]() Link Vulnerability Aware Task Deployment over Edge and Cloud.Īutomated grading of programming exams with JUnit and Semgrep.īayesian learning-based impedance control of an aerial robot for writing. Techniques to Process point cloud data to perform HAR using Machine learning.įew-shot deep learning models for acoustic scene classification in low-complexity scenarios.įrom personal to community knowledge : stimulating knowledge sharing among student groups in knowledge management platforms through interaction design. ![]() Preventing soft-errors and hardware trojans in embedded RISC-V cores. Intelligent Wifi Access Points for Diverse User needs: QoS Slicing in SDN Controlled APs.Įffect of image quality in computer vision for semantic Knowledge Management System Design For An Agile Digital Agency : The Case Of El Niño B.V.Įnabling joint exploration of virtual environments for treatment of substance use disorders using an asymmetric virtual reality approach. The impact of graph properties on the complexity of attack tree analysis.Įvaluating pose estimation and object detection models for the application in the minisoccerbal project.Ĭontrol of redundant mechanical systems in the presence of external disturbances.Īchieving full autonomy in aerial and physical human-robot interaction control via onboard perception algorithms relying on computer vision. Performing Bisimulation Minimisation To Parity Game Strategies To Improve Controller Quality. ![]() Creating a data visualization to increase awareness surrounding the carbon emissions of digital consumption. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |