Sciweavers

1352 search results - page 169 / 271
» Designing Security Requirements Models Through Planning
Sort
View
HICSS
2005
IEEE
101views Biometrics» more  HICSS 2005»
14 years 3 months ago
Attention and Communication: Decision Scenarios for Teleoperating Robots
The economics of robot manufacturing is driving us toward situations in which a single human operator will be expected to split attention across multiple semiautonomous vehicles, ...
Jeffrey V. Nickerson, Steven Skiena
SIGCSE
2005
ACM
125views Education» more  SIGCSE 2005»
14 years 3 months ago
Efficient use of robots in the undergraduate curriculum
In this paper we describe how a single Khepera II robot was used for an assignment in a senior level course on graphical user interface implementation. The assignment required eac...
Judith Challinger
AI
1999
Springer
13 years 9 months ago
Experiences with an Interactive Museum Tour-Guide Robot
This article describes the software architecture of an autonomous, interactive tour-guide robot. It presents a modular, distributed software architecture, which integrates localiz...
Wolfram Burgard, Armin B. Cremers, Dieter Fox, Dir...
HPCS
2006
IEEE
14 years 4 months ago
Collaborative Agents for Data Dissemination in Wireless Sensor Networks
This paper presents collaborative agents system architecture approach for data dissemination in a wireless sensor network (WSN). This system architecture consists of four layers o...
Sajid Hussain, Elhadi Shakshuki, Abdul Wasey Matin...
JSAC
2006
111views more  JSAC 2006»
13 years 10 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras