Sciweavers

4281 search results - page 766 / 857
» How to Disembed a Program
Sort
View
ICRA
2007
IEEE
162views Robotics» more  ICRA 2007»
14 years 5 months ago
Learning and Evaluation of the Approach Vector for Automatic Grasp Generation and Planning
— In this paper, we address the problem of automatic grasp generation for robotic hands where experience and shape primitives are used in synergy so to provide a basis not only f...
Staffan Ekvall, Danica Kragic
ICTAI
2007
IEEE
14 years 5 months ago
Strong Inverse Consistencies for Non-Binary CSPs
Domain filtering local consistencies, such as inverse consistencies, that only delete values and do not add new constraints are particularly useful in Constraint Programming. Alt...
Kostas Stergiou
IEEEARES
2007
IEEE
14 years 5 months ago
Near Optimal Protection Strategies Against Targeted Attacks on the Core Node of a Network
The issue of information security has attracted increasing attention in recent years. In network attack and defense scenarios, attackers and defenders constantly change their resp...
Frank Yeong-Sung Lin, Po-Hao Tsang, Yi-Luen Lin
IPPS
2007
IEEE
14 years 5 months ago
Scalable, Distributed, Dynamic Resource Management for the ARMS Distributed Real-Time Embedded System
We present a scalable, hierarchical control system for the dynamic resource management of a distributed real-time embedded (DRE) system. This DRE is inspired by the DARPA Adaptive...
Kurt Rohloff, Yarom Gabay, Jianming Ye, Richard E....
ISCC
2007
IEEE
141views Communications» more  ISCC 2007»
14 years 5 months ago
Aspectizing a Web Server for Adaptation
— Web servers are exposed to extremely changing runtime requirements. Going offline to adjust policies and configuration parameters in order to cope with such requirements is n...
Wasif Gilani, Julio Sincero, Olaf Spinczyk, Wolfga...