DARPA Grand Challenge (2007)
Semantic Scholar uses AI to extract papers important to this topic.
Memory corruption vulnerabilities are an everpresent risk in software, which attackers can exploit to obtain unauthorized access… Expand We present a methodology for automatic synthesis of embedded control software that incorporates a class of linear temporal logic… Expand DISCLAIMER: The information contained in this paper does not represent the official policies, either expressed or implied, of the… Expand We describe a practical path-planning algorithm for an autonomous vehicle operating in an unknown semi-structured (or… Expand In this paper, a LIDAR-based road and road-edge detection method is proposed to identify road regions and road-edges, which is an… Expand This volume, edited by Martin Buehler, Karl Iagnemma and Sanjiv Singh, presents a unique and comprehensive collection of the… Expand In this paper we describe a LIDAR-based navigation approach applied at both the C-Elrob (European Land Robot Trial) 2007 and the… Expand This paper describes a real-time motion planning algorithm, based on the rapidly-exploring random tree (RRT) approach, applicable… Expand This article presents the architecture of Junior, a robotic vehicle capable of navigating urban environments autonomously. In… Expand This paper provides a detailed analysis of the motion planning subsystem for the MIT DARPA Urban Challenge vehicle. The approach… Expand