Sciweavers

1240 search results - page 209 / 248
» Composition with Target Constraints
Sort
View
WSC
2004
13 years 11 months ago
Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems
Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical powe...
Jeffrey J. Farris, David M. Nicol
AAAI
1998
13 years 11 months ago
Multimodal Reasoning for Automatic Model Construction
This paper describes a program called Pret that automates system identification, the process of finding a dynamical model of a black-box system. Pret performs both structural iden...
Reinhard Stolle, Elizabeth Bradley
RIAO
2000
13 years 11 months ago
Multimedia structuring using trees
Traditionally work on multimedia structuring has been centered on the creation of indices and their use for searching. Although searching is important there are many cases where t...
George Tzanetakis, Luc Julia
VCIP
2000
148views Communications» more  VCIP 2000»
13 years 11 months ago
Aircraft recognition and pose estimation
This work presents a geometry based vision system for aircraft recognition and pose estimation using single images. Pose estimation improves the tracking performance of guided wea...
Hatem Hmam, Jijoong Kim
WOA
2000
13 years 11 months ago
Implementing Autonomous Reactive Agents by Using Active Objects
This paper briefly outlines the main characteristics of an ongoing research aimed at developing a support library for implementing systems based on autonomous agents. The library ...
Giuliano Armano, Eloisa Vargiu