Sciweavers

549 search results - page 64 / 110
» Towards Robust PATR
Sort
View
PLDI
2009
ACM
14 years 2 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
BROADNETS
2005
IEEE
14 years 1 months ago
A Lightweight framework for source-to-sink data transfer in wireless sensor networks
— Lightweight protocols that are both bandwidth and power thrifty are desirable for sensor networks. In addition, for many sensor network applications, timeliness of data deliver...
James Jobin, Zhenqiang Ye, Honomount Rawat, Srikan...
EH
2004
IEEE
149views Hardware» more  EH 2004»
13 years 11 months ago
Organization of the Information Flow in the Perception-Action Loop of Evolved Agents
Sensor evolution in nature aims at improving the acquisition of information from the environment and is intimately related with selection pressure towards adaptivity and robustnes...
Alexander S. Klyubin, Daniel Polani, Chrystopher L...
CRIWG
2004
13 years 9 months ago
An Integrated Approach for Analysing and Assessing the Performance of Virtual Learning Groups
Collaborative distance learning involves a variety of elements and factors that have to be considered and measured in order to analyse and assess group and individual performance m...
Thanasis Daradoumis, Alejandra Martínez-Mon...
ICRA
2010
IEEE
138views Robotics» more  ICRA 2010»
13 years 6 months ago
Rao-Blackwellized particle filtering for probing-based 6-DOF localization in robotic assembly
This paper presents a probing-based method for probabilistic localization in automated robotic assembly. We consider peg-in-hole problems in which a needle-like peg has a single p...
Yuichi Taguchi, Tim K. Marks, Haruhisa Okuda