High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
This paper presents a distributed planning and control architecture for autonomous Multi-Manipulator Systems (MMS). The control architecture is implemented using an agent-based ap...
Juan C. Fraile, Christiaan J. J. Paredis, Pradeep ...
Many applications operate on time-sensitive data. Some of these data are only valid for certain intervals (e.g., job-assignments, versions of software code), others describe tempor...
We propose and test an objective criterion for evaluation of clustering performance: How well does a clustering algorithm run on unlabeled data aid a classification algorithm? The...
We present a technique for exploiting change blindness to allow the user to walk through an immersive virtual environment that is much larger than the available physical workspace...
Evan A. Suma, Seth Clark, Samantha L. Finkelstein,...