Sciweavers

153 search results - page 11 / 31
» Maintaining connectivity in environments with obstacles
Sort
View
ICRA
2010
IEEE
119views Robotics» more  ICRA 2010»
13 years 6 months ago
Evader surveillance under incomplete information
— This paper is concerned with determining whether a mobile robot, called the pursuer, is up to maintaining visibility of an antagonist agent, called the evader. This problem, a ...
Israel Becerra, Rafael Murrieta-Cid, Raul Monroy
MOBIQUITOUS
2007
IEEE
14 years 1 months ago
Towards Scalable and Robust Service Discovery in Ubiquitous Computing Environments via Multi-hop Clustering
Abstract— Large-scale ubiquitous computing environments require scalable and robust service discovery to enable “anytime, anywhere” computing, which is hard to be satisfied ...
Wei Gao
FPGA
2011
ACM
330views FPGA» more  FPGA 2011»
12 years 11 months ago
CoRAM: an in-fabric memory architecture for FPGA-based computing
FPGAs have been used in many applications to achieve orders-of-magnitude improvement in absolute performance and energy efficiency relative to conventional microprocessors. Despit...
Eric S. Chung, James C. Hoe, Ken Mai
AROBOTS
2010
111views more  AROBOTS 2010»
13 years 7 months ago
Elastic roadmaps - motion generation for autonomous mobile manipulation
The autonomous execution of mobile manipulation tasks in unstructured, dynamic environments requires the consideration of various motion constraints. The task itself imposes constr...
Yuandong Yang, Oliver Brock
JUCS
2008
124views more  JUCS 2008»
13 years 7 months ago
Mismatch Avoidance in Web Services Software Architectures
: Architectural mismatches are a recognized obstacle to successful software reuse. An architectural mismatch occurs when two or more software components are connected to form a sys...
Cristina Gacek, Carl Gamble