Sciweavers

988 search results - page 15 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
BPM
2007
Springer
134views Business» more  BPM 2007»
14 years 3 months ago
Mining Process Execution and Outcomes - Position Paper
Organizational processes in general and patient-care processes in particular, change over time. This may be in response to situations unpredicted by a predefined business process m...
Mor Peleg, Pnina Soffer, Johny Ghattas
ICRA
2005
IEEE
119views Robotics» more  ICRA 2005»
14 years 2 months ago
Fuzzy Enhanced Control of an Underactuated Finger Using Tactile and Position Sensors
— This paper proposes a control scheme dedicated to underactuated fingers with the intention of maximizing the capabilities of the latter using tactile and position information ...
Lionel Birglen, Clément Gosselin
RIA
2006
84views more  RIA 2006»
13 years 8 months ago
Learning Recursive Automata from Positive Examples
In this theoretical paper, we compare the "classical" learning techniques used to infer regular grammars from positive examples with the ones used to infer categorial gra...
Isabelle Tellier
ICRA
2005
IEEE
117views Robotics» more  ICRA 2005»
14 years 2 months ago
Optimal Positioning Strategies for Shape Changes in Robot Teams
Abstract— In this paper, we consider the task of repositioning a formation of robots to a new shape while minimizing either the maximum distance that any robot travels, or the to...
John R. Spletzer, Rafael B. Fierro
GLOBECOM
2008
IEEE
14 years 3 months ago
Guaranteed Boxed Localization in MANETs by Interval Analysis and Constraints Propagation Techniques
Abstract—In this contribution, we propose an original algorithm for self-localization in mobile ad-hoc networks. The proposed technique, based on interval analysis, is suited to ...
Farah Mourad, Hichem Snoussi, Fahed Abdallah, C&ea...