Sciweavers

182 search results - page 35 / 37
» Development of a Networked Robotic System for Disaster Mitig...
Sort
View
165
Voted
FC
2007
Springer
125views Cryptology» more  FC 2007»
15 years 9 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester
178
Voted
IDA
2008
Springer
15 years 3 months ago
Symbolic methodology for numeric data mining
Currently statistical and artificial neural network methods dominate in data mining applications. Alternative relational (symbolic) data mining methods have shown their effectivene...
Boris Kovalerchuk, Evgenii Vityaev
119
Voted
ALIFE
2004
15 years 3 months ago
Adaptability and Diversity in Simulated Turn-taking Behavior
Turn-taking behavior is simulated in a coupled-agents system. Each agent is modeled as a mobile robot with two wheels. A recurrent neural network is used to produce the motor outpu...
Hiroyuki Iizuka, Takashi Ikegami
107
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Tracking with Unreliable Node Sequences
—Tracking mobile targets using sensor networks is a challenging task because of the impacts of in-the-filed factors such as environment noise, sensing irregularity and etc. This...
Ziguo Zhong, Ting Zhu, Dan Wang, Tian He
127
Voted
ICANN
2005
Springer
15 years 9 months ago
HYDRA: From Cellular Biology to Shape-Changing Artefacts
The HYDRA work provides insight into the exploitation of holistic behavioural and morphological adaptation in the design of new artefacts. The potential of the new design principle...
Esben Hallundbæk Østergaard, David J....