Sciweavers

998 search results - page 96 / 200
» Networked Embedded Systems: A Quantitative Performance Compa...
Sort
View
128
Voted
IJCNN
2006
IEEE
15 years 9 months ago
How Not to Evaluate a Developmental System
—Computational models of development aim to describe the mechanisms that underlie the acquisition of new skills or the emergence of new capabilities. The strength of a model is j...
Frederick Shic, Brian Scassellati
116
Voted
ESANN
2000
15 years 5 months ago
Learning VOR-like stabilization reflexes in robots
We present a binocular robot that learns compensatory camera movements for image stabilization purposes. Most essential in achieving satisfactory image stabilization performance i...
Francesco Panerai, Giorgio Metta, Giulio Sandini
126
Voted
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
15 years 7 months ago
Impact of arrival burstiness on queue length: An infinitesimal perturbation analysis
Traffic burstiness has a significant impact on network performance. Burstiness can cause buffer overflows and packet drops and is particularly problematic in the context of small-b...
Yan Cai, Yong Liu, Weibo Gong, Tilman Wolf
130
Voted
PERCOM
2003
ACM
16 years 3 months ago
Self-Adaptive Leasing for Jini
Distributed systems require strategies to detect and recover from failures. Many protocols for distributed systems employ a strategy based on leases, which grant a leaseholder acc...
Kevin Bowers, Kevin Mills, Scott Rose
133
Voted
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
15 years 4 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries