In the near future, off-road mobile robots will feature high levels of autonomy which will render them useful for a variety of tasks on Earth and other planets. Many terrestrial a...
The generation of prime numbers underlies the use of most public-key schemes, essentially as a major primitive needed for the creation of key pairs or as a computation stage appear...
We present a novel method for information-theoretic exploration, leveraging recent work on mapping and localization. We describe exploration as the constrained optimization proble...
SAT-based bounded verification of annotated code consists of translating the code together with the annotations to a propositional formula, and analyzing the formula for specifica...
Networked UNIX workstations as well as workstations running Windows 98 and Windows NT are fast becoming the standard computing environments at many universities and research sites....