This paper presents a trajectory planning method for wheeled robots with fixed steering axes while the steering angle of each wheel is constrained.
Robotics
We consider the design of a positioning system where a robot determines its position from local observations.
Discrete Mathematics G.2.1
We use a dataset measured in an indoor environment to demonstrate that the proposed method is practically feasible with just four base station antennas, that it produces a channel chart that is suitable for localization in the global coordinate frame and that it outperforms other state-of-the-art methods under the given limitations.
Information Theory Signal Processing Information Theory
The emulator is implemented using a finite impulse response (FIR) filter.
Networking and Internet Architecture Signal Processing
Established results indicate that, perhaps surprisingly, maximal security is achieved when the network is as small as two nodes due to increased delays in larger networks.
Cryptography and Security
Techniques for verifying or invalidating the security of computer systems have come a long way in recent years.
Cryptography and Security
Careless creation of tags can lead to an exponential blowup in the tag space, with the overhead outweighing the benefits.
Databases
A bound of the approximation error of the randomized SVD with the shifted power iteration is also proved.
Mathematical Software Numerical Analysis Numerical Analysis
Anonymous metadata-private voice call protocols suffer from high delays and so far cannot provide group call functionality.
Cryptography and Security
Generative artificial intelligence (AI) and large language models (LLMs) are increasingly being used in the academic writing process.
Computers and Society