Sciweavers

182 search results - page 35 / 37
» Development of a Networked Robotic System for Disaster Mitig...
Sort
View
FC
2007
Springer
125views Cryptology» more  FC 2007»
14 years 29 days ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester
IDA
2008
Springer
13 years 6 months ago
Symbolic methodology for numeric data mining
Currently statistical and artificial neural network methods dominate in data mining applications. Alternative relational (symbolic) data mining methods have shown their effectivene...
Boris Kovalerchuk, Evgenii Vityaev
ALIFE
2004
13 years 6 months ago
Adaptability and Diversity in Simulated Turn-taking Behavior
Turn-taking behavior is simulated in a coupled-agents system. Each agent is modeled as a mobile robot with two wheels. A recurrent neural network is used to produce the motor outpu...
Hiroyuki Iizuka, Takashi Ikegami
INFOCOM
2009
IEEE
14 years 1 months ago
Tracking with Unreliable Node Sequences
—Tracking mobile targets using sensor networks is a challenging task because of the impacts of in-the-filed factors such as environment noise, sensing irregularity and etc. This...
Ziguo Zhong, Ting Zhu, Dan Wang, Tian He
ICANN
2005
Springer
14 years 10 days ago
HYDRA: From Cellular Biology to Shape-Changing Artefacts
The HYDRA work provides insight into the exploitation of holistic behavioural and morphological adaptation in the design of new artefacts. The potential of the new design principle...
Esben Hallundbæk Østergaard, David J....