– Future robotic space missions will employ a precision soft-landing capability that will enable exploration of previously inaccessible sites that have strong scientific signific...
Andrew Edie Johnson, James F. Montgomery, Larry Ma...
Abstract— In this paper we describe the use of automatic exploration for autonomous mapping of outdoor scenes. We describe a real-time SLAM implementation along with an autonomou...
: Information fusion has a potential applicability to a multitude of different applications. Still, the JDL model is mostly used to describe defense applications. This paper descri...
Computer security auditing constitutes an important part of any organization's security procedures. Because of the many inadequacies of currently used manual methods, thoroug...
Computer security breaches are already a major problem in using computers. The most basic defense against it is to monitor and audit the computer logs. Computer logs, however, hav...