Sciweavers

859 search results - page 84 / 172
» The Changing Face of Cryptography
Sort
View
JUCS
2008
123views more  JUCS 2008»
13 years 9 months ago
Exploring Information Extraction Resilience
: There are many challenges developers face when attempting to reliably extract data from the Web. One of these challenges is the resilience of the extraction system to changes in ...
Dawn G. Gregg
ISCI
2002
112views more  ISCI 2002»
13 years 8 months ago
Intelligent learning and control of autonomous robotic agents operating in unstructured environments
The control of autonomous intelligent robotic agent operating in unstructured changing environments includes many objective difficulties. One major difficulty concerns the charact...
Hani Hagras, Tarek M. Sobh
IAT
2009
IEEE
14 years 3 months ago
Distributed Constraint Optimization for Large Teams of Mobile Sensing Agents
Abstract. A team of mobile sensors can be used for coverage of targets in different environments. The dynamic nature of such an application requires the team of agents to adjust th...
Roie Zivan, Robin Glinton, Katia P. Sycara
APSEC
2008
IEEE
14 years 3 months ago
Towards Unanticipated Runtime Adaptation of Java Applications
Modifying an application usually means to stop the application, apply the changes, and start the application again. That means, the application is not available for at least a sho...
Mario Pukall, Christian Kästner, Gunter Saake
CIDM
2007
IEEE
14 years 3 months ago
Reactive Query Policies: A Formalism for Planning with Volatile External Information
— To generate plans for collecting data for data mining, an important problem is information volatility during planning: the information needed by the planning system may change ...
Tsz-Chiu Au, Dana S. Nau