Sciweavers

2645 search results - page 190 / 529
» Autonomous security for autonomous systems
Sort
View
ICCSA
2005
Springer
15 years 10 months ago
Reflective Middleware for Location-Aware Application Adaptation
Today mobile computing is pervasively taking over the traditional desktop computing. Mobile devices are characterized by abrupt and unannounced changes in execution context. The ap...
Uzair Ahmad, S. Y. Lee, Mahrin Iqbal, Uzma Nasir, ...
147
Voted
IJRR
2010
153views more  IJRR 2010»
15 years 1 months ago
Cooperative AUV Navigation using a Single Maneuvering Surface Craft
This paper describes the experimental implementation of an online algorithm for cooperative localization of submerged autonomous underwater vehicles (AUVs) supported by an autonom...
Maurice F. Fallon, Georgios Papadopoulos, John J. ...
GLOBECOM
2009
IEEE
15 years 11 months ago
On the Eyeshots of BGP Vantage Points
—The publicly available BGP vantage points (VPs) have been heavily used by the research community to build the Internet autonomous system (AS) level topology, which is a key inpu...
Kai Chen, Chengchen Hu, Wenwen Zhang, Yan Chen, Bi...
117
Voted
AGENTS
2000
Springer
15 years 9 months ago
The Socio-cognitive Dynamics of Trust: Does Trust Create Trust?
We will examine in this paper three crucial aspects of trust dynamics: a) How A’s trusting B and relying on it in situation can actually (objectively) influence B’s trustworth...
Rino Falcone, Cristiano Castelfranchi
EH
2000
IEEE
98views Hardware» more  EH 2000»
15 years 9 months ago
Scalable Evolvable Hardware Applied to Road Image Recognition
Evolvable Hardware (EHW) has the potential to become a new target hardware for complex real-world applications. However, there are several problems that would have to be solved to...
Jim Torresen