Sciweavers

1266 search results - page 122 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
WSC
1997
15 years 5 months ago
Simulation of the Queston Physician Network
This paper examines the construction and implementation of a simulation model that supports the design and development of the Queston Physician Network. Queston seeks to partner w...
James R. Swisher, J. Brian Jun, Sheldon H. Jacobso...
IROS
2007
IEEE
148views Robotics» more  IROS 2007»
15 years 10 months ago
Tractable probabilistic models for intention recognition based on expert knowledge
— Intention recognition is an important topic in human-robot cooperation that can be tackled using probabilistic model-based methods. A popular instance of such methods are Bayes...
Oliver C. Schrempf, David Albrecht, Uwe D. Hanebec...
FSKD
2005
Springer
91views Fuzzy Logic» more  FSKD 2005»
15 years 10 months ago
Recognition of Identifiers from Shipping Container Images Using Fuzzy Binarization and Enhanced Fuzzy Neural Network
In this paper, we propose and evaluate a novel recognition algorithm for container identifiers that effectively overcomes these difficulties and recognizes identifiers from contain...
Kwang-Baek Kim
TSP
2008
100views more  TSP 2008»
15 years 4 months ago
Geographic Gossip: Efficient Averaging for Sensor Networks
Gossip algorithms for distributed computation are attractive due to their simplicity, distributed nature, and robustness in noisy and uncertain environments. However, using standa...
Alexandros G. Dimakis, Anand D. Sarwate, Martin J....
CW
2005
IEEE
15 years 10 months ago
On a Serverless Networked Virtual Ball Game for Multi-Player
This paper studies the way to improve consistency of states in a ball-game typed Distributed Virtual Environment (DVE) with lag, in peer-to-peer (P2P) architecture. That is, we ar...
Yoshihiro Kawano, Tatsuhiro Yonekura