Sciweavers

1674 search results - page 242 / 335
» Learning Actions From the Web
Sort
View
SACMAT
2003
ACM
15 years 9 months ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
CDC
2009
IEEE
178views Control Systems» more  CDC 2009»
15 years 8 months ago
Distributed coverage games for mobile visual sensors (I): Reaching the set of Nash equilibria
— We formulate a coverage optimization problem for mobile visual sensor networks as a repeated multi-player game. Each visual sensor tries to optimize its own coverage while mini...
Minghui Zhu, Sonia Martínez
ICRA
1995
IEEE
125views Robotics» more  ICRA 1995»
15 years 7 months ago
Inductive Generation of Diagnostic Knowledge for Autonomous Assembly
A generic architecture for evolutive supervision of robotized assembly tasks is presented. This architecture , at different levels of abstraction, functions for dispatching action...
Luís Seabra Lopes, Luis M. Camarinha-Matos
AAAI
2006
15 years 5 months ago
MedEthEx: A Prototype Medical Ethics Advisor
As part of a larger Machine Ethics Project, we are developing an ethical advisor that provides guidance to health care workers faced with ethical dilemmas. MedEthEx is an implemen...
Michael Anderson, Susan Leigh Anderson, Chris Arme...
FLAIRS
2003
15 years 5 months ago
Cost-Based Policy Mapping for Imitation
Imitation represents a powerful approach for programming and autonomous learning in robot and computer systems. An important aspect of imitation is the mapping of observations to ...
Srichandan V. Gudla, Manfred Huber