Sciweavers

7504 search results - page 167 / 1501
» Computing with Action Potentials
Sort
View
CCS
2009
ACM
14 years 2 months ago
Ripley: automatically securing web 2.0 applications through replicated execution
Rich Internet applications are becoming increasingly distributed, as demonstrated by the popularity of AJAX or Web 2.0 applications such as Facebook, Google Maps, Hotmail and many...
K. Vikram, Abhishek Prateek, V. Benjamin Livshits
JETAI
2008
114views more  JETAI 2008»
13 years 8 months ago
On the nature of minds, or: truth and consequences
Are minds really dynamical or are they really symbolic? Because minds are bundles of computations, and because computation is always a matter of interpretation of one system by an...
Shimon Edelman
PG
1997
IEEE
14 years 10 days ago
Real-time virtual humans
The last few years have seen great maturationin the computation speed and control methods needed to portray 3D virtualhumanssuitableforreal interactiveapplications. We first desc...
Norman I. Badler
TOG
2012
232views Communications» more  TOG 2012»
11 years 10 months ago
Discovery of complex behaviors through contact-invariant optimization
We present a motion synthesis framework capable of producing a wide variety of important human behaviors that have rarely been studied, including getting up from the ground, crawl...
Igor Mordatch, Emanuel Todorov, Zoran Popovic
ROBIO
2006
IEEE
121views Robotics» more  ROBIO 2006»
14 years 2 months ago
Behaviour Cooperation by Negation for Mobile Robots
— This article presents a behavioural architecture, the Survival Kit (SK), which allows behaviours to cast their multivalued output by means of constraints over an ’action feat...
Pedro Santana, Luís Correia