Sciweavers

59 search results - page 11 / 12
» Online Planning to Control a Packaging Infeed System
Sort
View
IADIS
2004
13 years 7 months ago
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI
We have designed and deployed a system that uses X.509 public-key certificates (PKC) and attribute certificates (AC) for access control. This includes an authorization service for...
Diana Berbecaru, Antonio Lioy
IROS
2008
IEEE
120views Robotics» more  IROS 2008»
14 years 5 days ago
Soft motion trajectory planner for service manipulator robot
Abstract— Human interaction introduces two main constraints: Safety and Comfort. Therefore service robot manipulator can’t be controlled like industrial robotic manipulator whe...
Xavier Broquère, Daniel Sidobre, Ignacio He...
ACL
1998
13 years 7 months ago
Learning Intonation Rules for Concept to Speech Generation
In this paper, we report on an effort to provide a general-purpose spoken language generation tool for Concept-to-Speech (CTS) applications by extending a widely used text generat...
Shimei Pan, Kathleen McKeown
IROS
2007
IEEE
212views Robotics» more  IROS 2007»
14 years 1 days ago
GPU-accelerated real-time 3D tracking for humanoid locomotion and stair climbing
— For humanoid robots to fully realize their biped potential in a three-dimensional world and step over, around or onto obstacles such as stairs, appropriate and efficient appro...
Philipp Michel, Joel E. Chestnutt, Satoshi Kagami,...
AIM
2002
13 years 5 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe