Sciweavers

2774 search results - page 417 / 555
» Exploiting Deep Structure
Sort
View
132
Voted
BIRTHDAY
2005
Springer
15 years 10 months ago
Towards Comprehensive Computational Models for Plan-Based Control of Autonomous Robots
In this paper we present an overview of recent developments in the plan-based control of autonomous robots. We identify computational principles that enable autonomous robots to a...
Michael Beetz
CEAS
2005
Springer
15 years 10 months ago
Email Task Management: An Iterative Relational Learning Approach
Today’s email clients were designed for yesterday’s email. Originally, email was merely a communication medium. Today, people engage in a variety of complex behaviours using e...
Rinat Khoussainov, Nicholas Kushmerick
CHARME
2005
Springer
143views Hardware» more  CHARME 2005»
15 years 10 months ago
Saturation-Based Symbolic Reachability Analysis Using Conjunctive and Disjunctive Partitioning
Abstract. We propose a new saturation-based symbolic state-space generation algorithm for finite discrete-state systems. Based on the structure of the high-level model specificat...
Gianfranco Ciardo, Andy Jinqing Yu
DCOSS
2005
Springer
15 years 10 months ago
A Distributed Greedy Algorithm for Connected Sensor Cover in Dense Sensor Networks
Abstract. Achieving optimal battery usage and prolonged network lifetime are two of the most fundamental issues in wireless sensor networks. By exploiting node and data redundancy ...
Amitabha Ghosh, Sajal K. Das
FCT
2005
Springer
15 years 10 months ago
On the Incompressibility of Monotone DNFs
We prove optimal lower bounds for multilinear circuits and for monotone circuits with bounded depth. These lower bounds state that, in order to compute certain functions, these cir...
Matthias P. Krieger