Sciweavers

2645 search results - page 172 / 529
» Autonomous security for autonomous systems
Sort
View
SRDS
2008
IEEE
15 years 10 months ago
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
Unattended Wireless Sensor Networks (UWSNs) are composed of many small resource-constrained devices and operate autonomously, gathering data which is periodically collected by a v...
Roberto Di Pietro, Di Ma, Claudio Soriente, Gene T...
EUROCAST
2005
Springer
87views Hardware» more  EUROCAST 2005»
15 years 10 months ago
Soft Computing and Geometrical Control for Computer Aided Driving
After having designed control systems for real autonomous cars in an urban environment using straight lines as reference [2], we are now trying to build a fuzzy control system base...
Javier Ruiz, Teresa de Pedro, Carlos Gonzál...
ICADL
2005
Springer
92views Education» more  ICADL 2005»
15 years 10 months ago
Choosing Appropriate Peer-to-Peer Infrastructure for Your Digital Libraries
Peer-to-Peer (P2P) overlay network aims to be a feasible platform for building federated but autonomous digital libraries. However, due to a plethora number of P2P infrastructures ...
Hao Ding, Ingeborg Sølvberg
AAAI
2010
15 years 5 months ago
A Distributed Method for Evaluating Properties of a Robot Formation
As a robot formation increases in size or explores places where it is difficult for a human operator to interact, autonomous control becomes critical. We propose a distributed aut...
Brent Beer, Ross Alan Mead, Jerry B. Weinberg
AGENTS
2000
Springer
15 years 8 months ago
Dynamically altering agent behaviors using natural language instructions
Smart avatars are virtual human representations controlled by real people. Given instructions interactively, smart avatars can act as autonomous or reactive agents. During a real-...
Rama Bindiganavale, William Schuler, Jan M. Allbec...