Sciweavers

2645 search results - page 455 / 529
» Autonomous security for autonomous systems
Sort
View
ECCV
2004
Springer
15 years 9 months ago
3D Digitization of a Hand-Held Object with a Wearable Vision Sensor
It is a common human behavior to hold a small object of interest and to manipulate it for observation. A computer system, symbiotic with a human, should recognize the object and th...
Sotaro Tsukizawa, Kazuhiko Sumi, Takashi Matsuyama
ISER
2004
Springer
173views Robotics» more  ISER 2004»
15 years 9 months ago
Synergies in Feature Localization by Air-Ground Robot Teams
Abstract. This paper describes the implementation of a decentralized architecture for autonomous teams of aerial and ground vehicles engaged in active perception. We provide a theo...
Ben Grocholsky, Selcuk Bayraktar, Vijay Kumar, Cam...
IWQOS
2004
Springer
15 years 9 months ago
Topology design for service overlay networks with bandwidth guarantees
— The Internet still lacks adequate support for QoS applications with real-time requirements. In great part, this is due to the fact that provisioning of end-to-end QoS to traf...
S. L. Vieira, Jörg Liebeherr
DSRT
2003
IEEE
15 years 9 months ago
Real Time Inspection of Hidden Worlds
“Smart Things” are commonly understood as wireless ad-hoc networked, mobile, autonomous, special purpose computing appliances, usually interacting with their environment impli...
Alois Ferscha, Markus Keller
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 9 months ago
From Computer Networks to Agent Networks
From the 1990s on, one of the most important challenges facing computer science researchers has been the design and construction of software tools to exploit Internet computing. A...
Guoqiang Zhong, Kenichi Takahashi, Satoshi Amamiya...