To achieve complex missions an autonomous unmanned aerial vehicle (UAV) operating in dynamic environments must have and maintain situational awareness. This can be achieved by cont...
Abstract. To solve problems that require far more memory than a single machine can supply, data can be swapped to disk in some manner, it can be compressed, and/or the memory of mu...
This paper presents algorithms, simulations, and empirical results of a system that finds relative tag positions in 3D space using a new approach called “mobile infrastructure....
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Most studies of software outsourcing focus on how to manage the outsourcing from the perspective of the outsourcer, i.e., a company issuing a subcontract. There are few studies of ...