Sciweavers

453 search results - page 55 / 91
» Controllability analysis for current profile control in toka...
Sort
View
ICNP
2005
IEEE
14 years 2 months ago
Exploiting Dynamic Querying like Flooding Techniques in Unstructured Peer-to-Peer Networks
In unstructured peer-to-peer networks, controlled flooding aims at locating an item at the minimum message cost. Dynamic querying is a new controlled flooding technique. While i...
Hongbo Jiang, Shudong Jin
ECAI
2004
Springer
14 years 2 months ago
The KGP Model of Agency
This paper presents a new model of agency, called the KGP (Knowledge, Goals and Plan) model. This draws from the classic BDI model and proposes a hierarchical agent architecture wi...
Antonis C. Kakas, Paolo Mancarella, Fariba Sadri, ...
CHI
2007
ACM
14 years 29 days ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
ISCAPDCS
2004
13 years 10 months ago
Detecting Grid-Abuse Attacks by Source-based Monitoring
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
Jianjia Wu, Dan Cheng, Wei Zhao
ICRA
2010
IEEE
108views Robotics» more  ICRA 2010»
13 years 7 months ago
Multi-turn, tension-stiffening catheter navigation system
—In poorly constrained extra-vascular environments such as hollow viscera, current catheter navigation techniques are restricted to simple paths and therefore limit a doctor’s ...
Yi Chen, Jean H. Chang, Alison S. Greenlee, Kennet...