Sciweavers

1021 search results - page 130 / 205
» Concepts in Proof Planning
Sort
View
HRI
2009
ACM
14 years 3 months ago
Field trial for simultaneous teleoperation of mobile social robots
Simultaneous teleoperation of mobile, social robots presents unique challenges, combining the real-time demands of conversation with the prioritized scheduling of navigational tas...
Dylan F. Glas, Takayuki Kanda, Hiroshi Ishiguro, N...
PADS
2009
ACM
14 years 3 months ago
An Approach for Validation of Semantic Composability in Simulation Models
Semantic composability aims to ensure that the composition of simulation components is meaningful in terms of their expressed behavior, and achieves the desired objective of the n...
Claudia Szabo, Yong Meng Teo
RECONFIG
2009
IEEE
118views VLSI» more  RECONFIG 2009»
14 years 3 months ago
Protecting the NOEKEON Cipher against SCARE Attacks in FPGAs by Using Dynamic Implementations
Abstract. Protecting an implementation against Side Channel Analysis for Reverse Engineering (SCARE) attacks is a great challenge and we address this challenge by presenting a fir...
Julien Bringer, Hervé Chabanne, Jean-Luc Da...
ICRA
2009
IEEE
145views Robotics» more  ICRA 2009»
14 years 3 months ago
Expansion segmentation for visual collision detection and estimation
Abstract— Collision detection and estimation from a monocular visual sensor is an important enabling technology for safe navigation of small or micro air vehicles in near earth ...
Jeffrey Byrne, Camillo J. Taylor
ICST
2009
IEEE
14 years 3 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry