Sciweavers

192 search results - page 21 / 39
» An autonomous explore exploit strategy
Sort
View
ICRA
1998
IEEE
144views Robotics» more  ICRA 1998»
14 years 1 months ago
The Atacama Desert Trek: Outcomes
In June and July 1997, Nomad, a planetary-relevant mobile robot, traversed more than 220 kilometers across the barren Atacama Desert in Chile, exploring a landscape analogous to t...
Deepak Bapna, Eric Rollins, John Murphy, Mark W. M...
WOWMOM
2009
ACM
146views Multimedia» more  WOWMOM 2009»
14 years 3 months ago
When opportunity proceeds from autonomy: A tour-based architecture for disconnected mobile sensors
We consider the case of sparse mobile sensors deployed to implement missions in challenging environments. This paper explores a notion of tour networks that is well suited to circ...
Michel Charpentier, Radim Bartos, Swapnil Bhatia
CORR
2010
Springer
148views Education» more  CORR 2010»
13 years 9 months ago
Techniques for Enhanced Physical-Layer Security
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channel...
Pedro C. Pinto, João Barros, Moe Z. Win
EUMAS
2006
13 years 10 months ago
OWL-S for Describing Artifacts
Artifacts for Multi-Agent Systems have been defined as runtime entities providing some kind of function or service that agents can fruitfully exploit to achieve their individual o...
Rossella Rubino, Ambra Molesini, Enrico Denti
CVPR
2009
IEEE
15 years 4 months ago
A Projective Framework for Radiometric Image Analysis
Different materials reflect light in different ways, and reflectance interacts with shape, lighting, and viewpoint to determine an object’s image. Common materials exhibit dive...
Ping Tan (National University of Singapore), Todd ...