Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....
Video game players often learn to map their physical actions (e.g., pressing buttons) onto their on-screen avatars' actions (e.g., wielding swords) in order to play. We explo...
In this paper we propose a general framework for local pathplanning and steering that can be easily extended to perform highlevel behaviors. Our framework is based on the concept ...
Mubbasir Kapadia, Shawn Singh, William Hewlett, Pe...
Side effects are both the essence and bane of imperative programming. The programmer must carefully coordinate actions to manage their side effects upon each other. Such coordinat...
—This paper introduces a new approach to develop robots that can learn general affordance relations from their experiences. Our approach is a part of larger efforts to develop a ...
Erdem Erdemir, Carl B. Frankel, Kazuhiko Kawamura,...