Sciweavers

652 search results - page 118 / 131
» A neural network delay compensator for networked control sys...
Sort
View
FC
2010
Springer
171views Cryptology» more  FC 2010»
13 years 11 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
HASE
2007
IEEE
14 years 1 months ago
SyncProbe: Providing Assurance of Message Latency through Predictive Monitoring of Internet Paths
SyncProbe improves the end-to-end predictability of distributed systems by providing applications with a real-time estimate of the maximum expected message delay (upper bound on c...
Jawwad Shamsi, Monica Brockmeyer
AIIDE
2009
13 years 8 months ago
Investigating the Interplay between Camera Viewpoints, Game Information, and Challenge
Players perceive information about game environments through a virtual camera. While a significant discussion in the industry and in academic research circles has centered around ...
Arnav Jhala, Martin Schwartz, Hector Perez Martine...
IJCNN
2006
IEEE
14 years 1 months ago
Reinforcement Learning for Parameterized Motor Primitives
Abstract— One of the major challenges in both action generation for robotics and in the understanding of human motor control is to learn the “building blocks of movement genera...
Jan Peters, Stefan Schaal
AROBOTS
2000
179views more  AROBOTS 2000»
13 years 7 months ago
A Gesture Based Interface for Human-Robot Interaction
Service robotics is currently a pivotal research area in robotics, with enormous societal potential. Since service robots directly interact with people, nding natural" and ea...
Stefan Waldherr, Roseli Romero, Sebastian Thrun