Sciweavers

5272 search results - page 1025 / 1055
» Design of Social Agents
Sort
View
NOMS
2002
IEEE
104views Communications» more  NOMS 2002»
14 years 1 months ago
Remote MIB-item look-up service
: Despite some deficiencies, the Internet management framework is widely deployed and thousands of Management Information Base (MIB) modules have been defined thus far. These modul...
Aiko Pras, Szabolcs Boros, Bert Helthuis
WETICE
2002
IEEE
14 years 1 months ago
Towards an Access Control System for Mobile Peer-to-Peer Collaborative Environments
Access control is one of the key requirements in enterprise security. A number of approaches in distributed systems have been designed that support various (new) paradigms such as...
Pascal Fenkam, Schahram Dustdar, Engin Kirda, Gera...
WETICE
2002
IEEE
14 years 1 months ago
Analysis of an Anonymity Network for Web Browsing
Various systems offering anonymity for near real-time Internet traffic have been operational. However, they did not deliver many quantitative results about performance, bandwidth...
Marc Rennhard, Sandro Rafaeli, Laurent Mathy, Bern...
GECCO
2010
Springer
167views Optimization» more  GECCO 2010»
14 years 1 months ago
Evolving CPPNs to grow three-dimensional physical structures
The majority of work in the field of evolutionary robotics concerns itself with evolving control strategies for human designed or bio-mimicked robot morphologies. However, there ...
Joshua E. Auerbach, Josh C. Bongard
VRST
2009
ACM
14 years 1 months ago
Crime scene robot and sensor simulation
Virtual reality has been proposed as a training regime for a large number of tasks from surgery rehearsal (cf. [Robb et al. 1996], to combat simulation (cf. [U. S. Congress, Offi...
Robert Codd-Downey, Michael Jenkin
« Prev « First page 1025 / 1055 Last » Next »