Abstract is missing.
- Concept for Cross-platform Delegation of Heterogeneous UAVs in a MUM-T EnvironmentSiegfried Maier, Axel Schulte. 3-9 [doi]
- Swarms, Teams, or Choirs? Metaphors in Multi-UAV Systems DesignOscar Bjurling, Mattias Arvola, Tom Ziemke. 10-15 [doi]
- Visual Communication with UAS: Estimating Parameters for Gestural Transmission of Task DescriptionsAlexander Schelle, Peter Stütz. 16-24 [doi]
- A Distributed Mission-Planning Framework for Shared UAV Use in Multi-operator MUM-T ApplicationsGunar Roth, Axel Schulte. 25-32 [doi]
- Conditional Behavior: Human Delegation Mode for Unmanned Vehicles Under Selective Datalink AvailabilityCarsten Meyer, Axel Schulte. 35-42 [doi]
- Lethal Autonomous Weapon Systems: An Advocacy PaperGuermantes Lailari. 43-51 [doi]
- Measuring the Impact of a Navigation Aid in Unmanned Ship Handling via a Shore Control CenterGökay Yayla, Chris Christofakis, Stijn Storms, Tim Catoor, Paolo Pilozzi, Yogang Singh, Gerben Peeters, Muhammad Raheel Afzal, Senne Van Baelen, Dimiter Holm, Robrecht Louw, Peter Slaets. 52-59 [doi]
- A Computational Assessment of Ergonomics in an Industrial Human-Robot Collaboration Workplace Using System DynamicsGuilherme Deola Borges, Rafael Ariente Neto, Diego Luiz de Mattos, Eugenio Andres Diaz Merino, Paula Carneiro, Pedro M. Arezes. 60-68 [doi]
- A New Modular Intensive Design Solution for ROVsQianqian Jing, Jing Luo, Yunhui Li. 69-76 [doi]
- Designing for the Unknown: Using Structured Analysis and Design Technique (SADT) to Create a Pilot Domain for a Shore Control Centre for Autonomous ShipsDag Rutledal. 79-86 [doi]
- Reporting of Ethical Conduct in Human-Robot Interaction ResearchJulia Rosén, Jessica Lindblom, Erik Billing. 87-94 [doi]
- Exploratory Analysis of Research Publications on Robotics in Costa Rica Main Public UniversitiesJuan Pablo Chaverri, Adrián Vega, Kryscia Ramírez-Benavides, Ariel Mora, Luis A. Guerrero. 95-102 [doi]
- A Century of Humanoid Robotics in Cinema: A Design-Driven ReviewNiccolò Casiddu, Claudia Porfirione, Francesco Burlando, Annapaola Vacanti. 103-109 [doi]
- RESPONDRONE - A Multi-UAS Platform to Support Situation Assessment and Decision Making for First RespondersMax Friedrich, Satenik Mnatsakanyan, David Kocharov, Joonas Lieb. 110-117 [doi]
- Exploring Resilience and Cohesion in Human-Autonomy Teams: Models and MeasurementSamantha Berg, Catherine Neubauer, Christa Robison, Christopher Kroninger, Kristin E. Schaefer, Andrea Krausman. 121-127 [doi]
- Multi-modal Emotion Recognition for User Adaptation in Social RobotsMichael Schiffmann, Aniella Thoma, Anja Richert. 128-134 [doi]
- Robot Design Needs Users: A Co-design Approach to HRIFrancesco Burlando, Xavier Ferrari Tumay, Annapaola Vacanti. 135-142 [doi]
- Social Robotic Platform to Strengthen Literacy SkillsMireya Zapata, Jacqueline Gordón, Andrés Caicedo, Jorge Alvarez-Tello. 143-149 [doi]
- Structural Bionic Method of Climbing Robot Based on Video Key Frame ExtractionXinxiong Liu, Yue Sun. 150-157 [doi]
- Prototype System for Control the ScorBot ER-4U Robotic Arm Using Free ToolsElizabeth Chávez-Chica, Jorge Buele, Franklin W. Salazar, José Varela Aldás. 158-165 [doi]
- Detecting Cyberattacks Using Linguistic AnalysisWayne Patterson. 169-175 [doi]
- Digital Image Forensics Using Hexadecimal Image AnalysisGina Fossati, Anmol Agarwal, Ebru Celikel Cankaya. 176-183 [doi]
- Identifying Soft Biometric Features from a Combination of Keystroke and Mouse DynamicsSally Earl, James Campbell, Oliver Buckley. 184-190 [doi]
- CyberSecurity Privacy RisksLinda R. Wilbanks. 191-198 [doi]
- Sharing Photos on Social Media: Visual Attention Affects Real-World Decision MakingShawn E. Fagan, Lauren Wade, Kurt Hugenberg, Apu Kapadia, Bennett I. Bertenthal. 199-206 [doi]
- Prosthetic Face Makeups and DetectionYang Cai. 207-214 [doi]
- Analysis of Risks to Data Privacy for Family Units in Many CountriesWayne Patterson. 215-222 [doi]
- Exploring Understanding and Usage of Two-Factor Authentication Account RecoveryJeremiah D. Still, Lauren N. Tiller. 223-231 [doi]
- Strategies of Naive Software Reverse Engineering: A Qualitative AnalysisSalsabil Hamadache, Markus Krause, Malte Elson. 232-237 [doi]
- How Safely Do We Behave Online? An Explanatory Study into the Cybersecurity Behaviors of Dutch CitizensRick van der Kleij, Susanne van 't Hoff-De Goede, Steve van de Weijer, Eric Rutger Leukfeldt. 238-246 [doi]
- Evaluating the BOLT Application: Supporting Human Observation, Metrics, and Cognitive Work AnalysisAryn Pyke, Ben Barone, Blaine Hoffman, Michael Kozak, Norbou Buchler. 247-255 [doi]
- Vulnerability Analysis Through Ethical Hacking TechniquesÁngel Rolando Delgado-Pilozo, Viviana Belen Demera-Centeno, Elba Tatiana Zambrano-Solorzano. 256-264 [doi]
- User Perceptions of Phishing Consequence Severity and Likelihood, and Implications for Warning Message DesignEleanor K. Foster, Keith S. Jones, Miriam E. Armstrong, Akbar Siami Namin. 265-273 [doi]