Sciweavers

36 search results - page 6 / 8
» Tampering identification using Empirical Frequency Response
Sort
View
SCAI
2008
13 years 8 months ago
Modeling Habituation in the Cnidarian Hydra
Abstract. In the design of behavior-based control architectures for robots it is common to use biology as inspiration, and often the observed functionalities of insect behaviors ar...
Malin Aktius, Mats Nordahl, Tom Ziemke
ICSE
2007
IEEE-ACM
14 years 7 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin
GLOBECOM
2007
IEEE
14 years 1 months ago
An Enhanced RFID Multiple Access Protocol for Fast Inventory
- The relevant performance metric for successful deployment of Radio Frequency Identification (RFID) systems for tag inventory applications is the latency for reading all tags with...
You-Chang Ko, Sumit Roy, Joshua R. Smith, Hyung-Wo...
AAAI
2007
13 years 9 months ago
The VITA Financial Services Sales Support Environment
Knowledge-based recommender technologies support customers and sales representatives in the identification of appropriate products and services. These technologies are especially ...
Alexander Felfernig, Klaus Isak, Kalman Szabo, Pet...
GECCO
2003
Springer
123views Optimization» more  GECCO 2003»
14 years 19 days ago
Benefits of Implicit Redundant Genetic Algorithms for Structural Damage Detection in Noisy Environments
A robust structural damage detection method that can handle noisy frequency response function information is discussed. The inherent unstructured nature of damage detection problem...
Anne M. Raich, Tamás Liszkai