Sciweavers

219 search results - page 24 / 44
» A Hybrid Method for Planning and Scheduling
Sort
View
JAIHC
2010
205views more  JAIHC 2010»
13 years 7 months ago
Soft computing in intrusion detection: the state of the art
The state of the art is explored in using soft computing (SC) methods for network intrusion detection, including the examination of efforts in ten specific areas of SC as well as ...
Chet Langin, Shahram Rahimi
ICRA
2008
IEEE
182views Robotics» more  ICRA 2008»
14 years 3 months ago
Hybrid laser and vision based object search and localization
— We describe a method for an autonomous robot to efficiently locate one or more distinct objects in a realistic environment using monocular vision. We demonstrate how to effic...
Dorian Galvez Lopez, Kristoffer Sjöö, Ch...
JNW
2008
116views more  JNW 2008»
13 years 7 months ago
Scalable Revocation in Hybrid Ad Hoc Networks: The SHARL Scheme
The article proposes a simple, scalable and robust scheme for the distribution of revocation information in mobile ad hoc networks (MANETs). The scheme is intended for ad hoc netwo...
Mona Holsve Ofigsbø, Anne Marie Hegland, P&...
ADAEUROPE
2005
Springer
14 years 2 months ago
Non-intrusive System Level Fault-Tolerance
This paper describes the methodology used to add nonintrusive system-level fault tolerance to an electronic throttle controller. The original model of the throttle controller is a...
Kristina Lundqvist, Jayakanth Srinivasan, Sé...
AI
2008
Springer
13 years 8 months ago
Speculative plan execution for information gathering
The execution performance of an information gathering plan can suffer significantly due to remote I/O latencies. A streaming dataflow model of execution addresses the problem to s...
Greg Barish, Craig A. Knoblock