To safely and efficiently guide personnel of search and rescue operations in disaster areas, swift gathering of relevant information such as the locations of victims, must occur. U...
Janice L. Pearce, Bob Powers, Chistopher Hess, Pau...
To safely and efficiently guide search and rescue operations in disaster areas, gathering of relevant information such as the locations of victims, must occur swiftly. Using the c...
Janice L. Pearce, Paul E. Rybski, Sascha Stoeter, ...
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
— Designing a localization system for a low-cost robotic consumer product poses a major challenge. In previous work, we introduced Vector Field SLAM [5], a system for simultaneou...
Jens-Steffen Gutmann, Gabriel Brisson, Ethan Eade,...
—With ever-growing complexity of computer and communication systems analytical methods do not scale, especially with respect to dependability assessment of information technology...
Tobias Goldschmidt, Andreas Dittrich, Miroslaw Mal...