Sciweavers

706 search results - page 99 / 142
» Access Control: Policies, Models, and Mechanisms
Sort
View
ICRA
2002
IEEE
167views Robotics» more  ICRA 2002»
14 years 1 months ago
Coordinated Teams of Reactive Mobile Platforms
This paper presents techniques for exploiting redundancy in teams of mobile robots. In particular, we address tasks involving the kinematic coordination of several communicating r...
John Sweeney, T. J. Brunette, Yunlei Yang, Roderic...
UM
2009
Springer
14 years 3 months ago
Evaluating Three Scrutability and Three Privacy User Privileges for a Scrutable User Modelling Infrastructure
This paper describes the evaluation of a Scrutable User Modelling Infrastructure. SUMI is intended to form a service to allow users to share their user models from social e-network...
Demetris Kyriacou, Hugh C. Davis, Thanassis Tiropa...
LREC
2010
143views Education» more  LREC 2010»
13 years 10 months ago
Language Service Management with the Language Grid
As the number of language resources accessible on the Internet increases, many efforts have been made for combining language resources and language processing tools to create new ...
Yohei Murakami, Donghui Lin, Masahiro Tanaka, Taka...
ENGL
2007
94views more  ENGL 2007»
13 years 8 months ago
Development of a Functional Neuromuscular Stimulation System for Independent Ambulation of Patients with a Spinal Cord Injury
— This paper proposes the use of a controlled assistive device, aimed as a support for the impaired individuals to allow a limited ambulatory function. The aim of the overall pro...
Alejandro Garcia Blanco, Gildardo Jimenez, Pedro O...
ICCBR
2007
Springer
14 years 2 months ago
An Analysis of Case-Based Value Function Approximation by Approximating State Transition Graphs
We identify two fundamental points of utilizing CBR for an adaptive agent that tries to learn on the basis of trial and error without a model of its environment. The first link co...
Thomas Gabel, Martin Riedmiller