Sciweavers

1893 search results - page 92 / 379
» Eliciting and Validating Knowledge in Knowledge Management S...
Sort
View
RAS
2008
84views more  RAS 2008»
15 years 4 months ago
Monitoring the execution of robot plans using semantic knowledge
Even the best laid plans can fail, and robot plans executed in real world domains tend to do so often. The ability of a robot to reliably monitor the execution of plans and detect...
Abdelbaki Bouguerra, Lars Karlsson, Alessandro Saf...
ICDAR
2007
IEEE
15 years 11 months ago
Knowledge-Based Recognition of Utility Map Sub-Diagrams
An integrated map of all utility services in a locale would facilitate better management of the road infrastructure and the utilities themselves. To meet this goal, there exists a...
Simon J. Hickinbotham, Anthony G. Cohn
HICSS
2003
IEEE
152views Biometrics» more  HICSS 2003»
15 years 9 months ago
Advanced Technology and Knowledge Transfer
This paper reports on a specific food and agribusiness industry project, employing new technological capabilities to better transfer expert knowledge. Knowledge transfer and techn...
Geetanjali Tandon, Steven T. Sonka
IPPS
2007
IEEE
15 years 10 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
158
Voted
TPDS
2008
116views more  TPDS 2008»
15 years 4 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...