Abstract— In this work, we study the inconsistency of EKFbased SLAM from the perspective of observability. We analytically prove that when the Jacobians of the state and measurem...
Guoquan Huang, Anastasios I. Mourikis, Stergios I....
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Real-time applications with security requirements are emerging in various areas including government, education, and business. The security sensitive real-time applications can ta...
Previous work suggests that reminding a conversational partner of mutually known information depends on the conversants' attentional state, their resource limits and the reso...
The basic finite automata model has been extended over the years with different acceptance modes (nondeterminism, alternation), new or improved devices (two-way heads, pebbles, ...