Sciweavers

988 search results - page 152 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
JIRS
2006
113views more  JIRS 2006»
13 years 8 months ago
Using Virtual Pheromones and Cameras for Dispersing a Team of Multiple Miniature Robots
To safely and efficiently guide personnel of search and rescue operations in disaster areas, swift gathering of relevant information such as the locations of victims, must occur. U...
Janice L. Pearce, Bob Powers, Chistopher Hess, Pau...
IJRR
2007
80views more  IJRR 2007»
13 years 8 months ago
Combined Path-following and Obstacle Avoidance Control of a Wheeled Robot
This paper proposes an algorithm that drives a unicycle type robot to a desired path, including obstacle avoidance capabilities. The path-following control design relies on Lyapun...
Lionel Lapierre, René Zapata, Pascal L&eacu...
IJWET
2007
99views more  IJWET 2007»
13 years 8 months ago
An empirical approach to evaluating web application compliance across diverse client platform configurations
: Web applications are the most widely used class of software today. Increased diversity of web-client platform configurations causes execution of web applications to vary unpredic...
Cyntrica Eaton, Atif M. Memon
TROB
2008
124views more  TROB 2008»
13 years 8 months ago
A Practical Visual Servo Control for an Unmanned Aerial Vehicle
An image-based visual servo control is presented for an Unmanned aerial vehicle (UAV) capable of stationary or quasi-stationary flight with the camera mounted on board the vehicle....
Nicolas Guenard, Tarek Hamel, Robert E. Mahony
TWC
2008
132views more  TWC 2008»
13 years 8 months ago
Asymptotic BER analysis of threshold digital relaying schemes in cooperative wireless systems
Threshold relaying is an effective technique to achieve cooperative diversity in uncoded cooperative wireless networks, which suffer from error propagation due to detection errors...
Furuzan Atay Onat, Yijia Fan, Halim Yanikomeroglu,...