— Complex, autonomous robots integrate a large set of sometimes very diverse algorithms across at least three levels of system organization: the agent architecture, the implement...
James F. Kramer, Matthias Scheutz, Paul W. Scherme...
Until recently, the design of packet dropping adversary identification protocols that are robust to both benign packet loss and malicious behavior has proven to be surprisingly el...
Abstract— Large-scale ubiquitous computing environments require scalable and robust service discovery to enable “anytime, anywhere” computing, which is hard to be satisfied ...
This work outlines the design process of a user centered learning object repository. A repository should foster the development and acquisition of both generic and specific informa...
Virtual worlds can allow conversational participants to achieve common ground in situations where the information volume and need for clarification is low. We argue in favor of th...
N. Sadat Shami, Thomas Erickson, Wendy A. Kellogg,...