Sciweavers

2645 search results - page 452 / 529
» Autonomous security for autonomous systems
Sort
View
ICRA
2005
IEEE
180views Robotics» more  ICRA 2005»
15 years 9 months ago
Transference of Evolved Unmanned Aerial Vehicle Controllers to a Wheeled Mobile Robot
— Transference of controllers evolved in simulation to real vehicles is an important issue in evolutionary robotics (ER). We have previously evolved autonomous navigation control...
Gregory J. Barlow, Leonardo Mattos, Edward Grant, ...
ICRA
2005
IEEE
150views Robotics» more  ICRA 2005»
15 years 9 months ago
Complex Task Allocation For Multiple Robots
Abstract— Recent research trends and technology developments are bringing us closer to the realization of autonomous multirobot systems performing increasingly complex missions. ...
Robert Zlot, Anthony Stentz
ICRA
2005
IEEE
106views Robotics» more  ICRA 2005»
15 years 9 months ago
Towards Topological Exploration of Abandoned Mines
— The need for reliable maps of subterranean spaces too hazardous for humans to occupy has motivated the use of robotic technology as mapping tools. As such, we present a systemi...
Aaron Morris, David Silver, David I. Ferguson, Sco...
INFOCOM
2005
IEEE
15 years 9 months ago
On the interaction between overlay routing and underlay routing
— In this paper, we study the interaction between overlay routing and Traffic Engineering (TE) in a single Autonomous System (AS). We formulate this interaction as a twoplayer n...
Yong Liu, Honggang Zhang, Weibo Gong, Donald F. To...
MMM
2005
Springer
115views Multimedia» more  MMM 2005»
15 years 9 months ago
Interoperability and Multimedia Archives
In distributed computing systems, it is unwise to move data to the point of program code, but instead process data at the point of storage. This concept is even more appropriate t...
Dalen Kambur, Damir Becarevic, Mark Roantree