Sciweavers

743 search results - page 81 / 149
» Intelligent Environment for Training of Power Systems Operat...
Sort
View
ISMIS
2005
Springer
14 years 2 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
TWC
2010
13 years 3 months ago
Adaptive linearly constrained minimum variance beamforming for multiuser cooperative relaying using the kalman filter
In this paper, we consider a wireless communication scenario with multiple source-destination pairs communicating through several cooperative amplify-and-forward relay terminals. T...
Amr El-Keyi, Benoît Champagne
KI
1998
Springer
14 years 29 days ago
GOLEX - Bridging the Gap between Logic (GOLOG) and a Real Robot
The control of mobile robots acting autonomously in the real world is one of the long-term goals of the field of artificial intelligence. So far the field lacks methods bridging th...
Dirk Hähnel, Wolfram Burgard, Gerhard Lakemey...
IROS
2006
IEEE
130views Robotics» more  IROS 2006»
14 years 2 months ago
A Novel Distributed Telerobotic System for Construction Machines Based on Modules Synchronization
— On a scene of a natural disaster, rescuers require heavy duty hydraulic machines to answer their need of large forces, or to approach an unreachable spot. Those industrial vehi...
Eric Rohmer, Kazuya Yoshida, E. Nakano
LFCS
2007
Springer
14 years 2 months ago
A Decidable Temporal Logic of Repeating Values
Various logical formalisms with the freeze quantifier have been recently considered to model computer systems even though this is a powerful mechanism that often leads to undecida...
Stéphane Demri, Deepak D'Souza, Régi...