Sciweavers

1643 search results - page 166 / 329
» Consistability: Describing Usually Consistent Systems
Sort
View
ECAI
1994
Springer
15 years 8 months ago
The DUAL Cognitive Architecture: A Hybrid Multi-Agent Approach
1 A hybrid (symbolic/connectionist) cognitive architecture, DUAL, is proposed. It is a multi-agent system which consist of a large number of non-cognitive, relatively simple agents...
Boicho N. Kokinov
139
Voted
CACM
2008
84views more  CACM 2008»
15 years 4 months ago
The emergence of a networking primitive in wireless sensor networks
The wireless sensor network community approached netabstractions as an open question, allowing answers to emerge with time and experience. The Trickle algorithm has become a basic...
Philip Levis, Eric A. Brewer, David E. Culler, Dav...
IVA
2009
Springer
15 years 11 months ago
Teaching Computers to Conduct Spoken Interviews: Breaking the Realtime Barrier with Learning
Abstract. Several challenges remain in the effort to build software capable of conducting realtime dialogue with people. Part of the problem has been a lack of realtime flexibili...
Gudny Ragna Jonsdottir, Kristinn R. Thóriss...
CAIP
1999
Springer
107views Image Analysis» more  CAIP 1999»
15 years 8 months ago
Adventurous Tourism for Couch Potatoes
Two tourist guides are described. One supports a virtual tour through an archaeological site, the other a tour through a real exhibition. The first system is based on the 3D recon...
Luc J. Van Gool, Tinne Tuytelaars, Marc Pollefeys
LISA
2000
15 years 5 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick