Sciweavers

2645 search results - page 363 / 529
» Autonomous security for autonomous systems
Sort
View
FLAIRS
2006
15 years 6 months ago
Automated Population of Cyc: Extracting Information about Named-entities from the Web
Populating the Cyc Knowledge Base (KB) has been a manual process until very recently. However, there is currently enough knowledge in Cyc for it to be feasible to attempt to acqui...
Purvesh Shah, David Schneider, Cynthia Matuszek, R...
BDA
2003
15 years 6 months ago
Transaction Routing with Freshness Control in a Cluster of Replicated Databases
: We consider the use of a cluster system with a shared nothing architecture for update-intensive autonomous databases. To optimize load balancing, we use optimistic database repli...
Hubert Naacke, François Dang Ngoc, Patrick ...
DAGSTUHL
2003
15 years 6 months ago
Evolution of Embodied Intelligence
Abstract. We provide an overview of the evolutionary approach to the emergence of artificial intelligence in embodied behavioral agents. This approach, also known as Evolutionary R...
Dario Floreano, Francesco Mondada, Andrés P...
DAGSTUHL
2003
15 years 6 months ago
The Future of Embodied Artificial Intelligence: Machine Consciousness?
The idea that internal models of the world might be useful has generally been rejected by embodied AI for the same reasons that led to its rejection by behaviour based robotics. Th...
Owen Holland
DAGSTUHL
2003
15 years 6 months ago
Traceability and Evaluation in Scenario Analysis by Use Case Maps
The Use Case Map (UCM) scenario notation has some strong features related to rapid capture and evaluation of requirements models. In this paper, we explain how a UCM model was deve...
Dorin Bogdan Petriu, Daniel Amyot, C. Murray Woods...