Sciweavers

3979 search results - page 136 / 796
» Wild control operators
Sort
View
IISWC
2006
IEEE
15 years 4 months ago
Characterization of Error-Tolerant Applications when Protecting Control Data
Soft errors have become a significant concern and recent studies have measured the “architectural vulnerability factor” of systems to such errors, or conversely, the potentia...
Darshan D. Thaker, Diana Franklin, John Oliver, Su...
ADAEUROPE
2005
Springer
15 years 3 months ago
A Reference Control Architecture for Service Robots Implemented on a Climbing Vehicle
Teleoperated robots are used to perform hazardous tasks that human operators cannot carry out. The purpose of this paper is to present a new architecture (ACROSET) for the developm...
Francisco J. Ortiz, Diego Alonso, Bárbara &...
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
15 years 3 months ago
A New Distinguisher for Clock Controlled Stream Ciphers
In this paper we present a distinguisher targeting towards irregularly clocked filter generators. The attack is applied on the irregularly clocked stream cipher called LILI-II. LI...
Håkan Englund, Thomas Johansson
ICRA
2003
IEEE
101views Robotics» more  ICRA 2003»
15 years 3 months ago
Proprioceptive Control for a Robotic Vehicle over Geometric Obstacles
In this paper we describe a software system built to coordinate an autonomous vehicle with variable configuration ability operating in rough terrain conditions. The paper describe...
Kenneth J. Waldron, Ronald C. Arkin, Douglas Bakku...
AGENTS
2000
Springer
15 years 2 months ago
Air traffic control and alert agent
This paper presents an agent program that monitors and interacts with the dynamic situation of flights around an airport tower as well as interacts with a human operator that can ...
Henry Hexmoor, Tim Heng