Sciweavers

59 search results - page 11 / 12
» Online Planning to Control a Packaging Infeed System
Sort
View
73
Voted
IADIS
2004
14 years 11 months ago
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI
We have designed and deployed a system that uses X.509 public-key certificates (PKC) and attribute certificates (AC) for access control. This includes an authorization service for...
Diana Berbecaru, Antonio Lioy
IROS
2008
IEEE
120views Robotics» more  IROS 2008»
15 years 3 months ago
Soft motion trajectory planner for service manipulator robot
Abstract— Human interaction introduces two main constraints: Safety and Comfort. Therefore service robot manipulator can’t be controlled like industrial robotic manipulator whe...
Xavier Broquère, Daniel Sidobre, Ignacio He...
ACL
1998
14 years 11 months ago
Learning Intonation Rules for Concept to Speech Generation
In this paper, we report on an effort to provide a general-purpose spoken language generation tool for Concept-to-Speech (CTS) applications by extending a widely used text generat...
Shimei Pan, Kathleen McKeown
IROS
2007
IEEE
212views Robotics» more  IROS 2007»
15 years 3 months ago
GPU-accelerated real-time 3D tracking for humanoid locomotion and stair climbing
— For humanoid robots to fully realize their biped potential in a three-dimensional world and step over, around or onto obstacles such as stairs, appropriate and efficient appro...
Philipp Michel, Joel E. Chestnutt, Satoshi Kagami,...
102
Voted
AIM
2002
14 years 9 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe