Sciweavers

8658 search results - page 117 / 1732
» Models of Command and Control
Sort
View
RTAS
2005
IEEE
14 years 2 months ago
A Distributed Real-Time Embedded Application for Surveillance, Detection, and Tracking of Time Critical Targets
As computer systems become increasingly internetworked, there is a growing class of distributed realtime embedded (DRE) applications that have characteristics and present challeng...
Joseph P. Loyall, Richard E. Schantz, David Corman...
ISMIR
2004
Springer
130views Music» more  ISMIR 2004»
14 years 2 months ago
Speech-Recognition Interfaces for Music Information Retrieval: 'Speech Completion' and 'Speech Spotter'
This paper describes music information retrieval (MIR) systems featuring automatic speech recognition. Although various interfaces for MIR have been proposed, speech-recognition i...
Masataka Goto, Katunobu Itou, Koji Kitayama, Tetsu...
ATAL
1999
Springer
14 years 1 months ago
A Planning Component for RETSINA Agents
In the RETSINA multi-agent system, each agent is provided with an internal planning component—the RETSINA planner. Each agent, using its internal planner, formulates detailed pla...
Massimo Paolucci, Onn Shehory, Katia P. Sycara, Di...
IWAI
1999
Springer
14 years 1 months ago
Redesigning the Agents' Decision Machinery
In a multi-agent system, agents must decide what to do and by what order. Autonomy is a key notion in such a system, since it is mainly the autonomy of the agents that makes the en...
Luis Antunes, Helder Coelho
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
14 years 1 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...