Sciweavers

2645 search results - page 383 / 529
» Autonomous security for autonomous systems
Sort
View
SDM
2007
SIAM
96views Data Mining» more  SDM 2007»
15 years 6 months ago
Understanding and Utilizing the Hierarchy of Abnormal BGP Events
Abnormal events, such as security attacks, misconfigurations, or electricity failures, could have severe consequences toward the normal operation of the Border Gateway Protocol (...
Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Z...
ICEIS
2009
IEEE
15 years 11 months ago
DeXIN: An Extensible Framework for Distributed XQuery over Heterogeneous Data Sources
Abstract. In the Web environment, rich, diverse sources of heterogeneous and distributed data are ubiquitous. In fact, even the information characterizing a single entity - like, f...
Muhammad Intizar Ali, Reinhard Pichler, Hong Linh ...
ICRA
2007
IEEE
199views Robotics» more  ICRA 2007»
15 years 10 months ago
Automatic Outlier Detection: A Bayesian Approach
— In order to achieve reliable autonomous control in advanced robotic systems like entertainment robots, assistive robots, humanoid robots and autonomous vehicles, sensory data n...
Jo-Anne Ting, Aaron D'Souza, Stefan Schaal
IBPRIA
2005
Springer
15 years 10 months ago
Monte Carlo Localization Using SIFT Features
The ability of finding its situation in a given environment is crucial for an autonomous agent. While navigating through a space, a mobile robot must be capable of finding its lo...
Arturo Gil, Óscar Reinoso, Maria Asunci&oac...
ISER
2004
Springer
148views Robotics» more  ISER 2004»
15 years 10 months ago
The Berkeley Lower Extremity Exoskeleton Project
In October 2003, the first functional load-bearing and energetically autonomous exoskeleton, called the Berkeley Lower Extremity Exoskeleton (BLEEX) was demonstrated, walking at th...
H. Kazerooni