Solving in an efficient manner many different optimal control tasks within the same underlying environment requires decomposing the environment into its computationally elemental ...
—Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating channels in a large distribut...
Abstract—This paper explores multi-operator supervisory control (MOSC) of multiple independent robots using two complementary approaches: a human factors experiment and an agent-...
Jonathan M. Whetten, Michael A. Goodrich, Yisong G...
We present a novel approach for unsupervised discovery of repetitive objects from 3D point clouds. Our method assumes that objects are geometrically consistent, and uses multiple o...
One of the most interesting challenges in the area of social computing and social media analysis is the so-called community analysis. A well known barrier in cross-community (mult...