Sciweavers

265 search results - page 29 / 53
» A Force of Nature
Sort
View
ICRA
2009
IEEE
178views Robotics» more  ICRA 2009»
13 years 6 months ago
A riemannian-geometry approach for dynamics and control of object manipulation under constraints
A Riemannian-geometry approach for control and stabilization of dynamics of object manipulation under holonomic or non-holonomic (but Pfaffian) constraints is presented. First, pos...
Suguru Arimoto, Morio Yoshida, Masahiro Sekimoto, ...
HICSS
2007
IEEE
151views Biometrics» more  HICSS 2007»
14 years 3 months ago
The Impact of Information Technology on the Temporal Optimization of Supply Chain Performance
The objective of this paper is to suggest a systematic means by which the timing and focus of information technology policies can be used to optimize supply chain performance and ...
Ken Dozier, David Chang
TSMC
2008
172views more  TSMC 2008»
13 years 8 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
COMSNETS
2012
205views more  COMSNETS 2012»
12 years 4 months ago
RODEO: Robust and rapidly deployable TDM mesh with QoS differentiation
Abstract—We present RODEO, a RObust and rapidly DEplOyable wireless mesh network designed for applications such as disaster management. Natural disasters often destroy existing c...
Aniesh Chawla, Vinay Yadav, Vasu Dev Sharma, Jitin...
CHI
2008
ACM
14 years 9 months ago
Keeping in touch by technology: maintaining friendships after a residential move
Many observers have praised new communication technologies for providing convenient and affordable tools for maintaining relationships at a distance. Yet the precise role of media...
Irina Shklovski, Robert E. Kraut, Jonathon N. Cumm...