The use of teleoperators in hostile environment applications | IEEE Conference Publication | IEEE Xplore