Sciweavers

1147 search results - page 126 / 230
» Transformation of Access Rights
Sort
View
AIPS
2004
13 years 10 months ago
Conformant Planning via Heuristic Forward Search: A New Approach
Conformant planning is the task of generating plans given uncertainty about the initial state and action effects, and without any sensing capabilities during plan execution. The p...
Ronen I. Brafman, Jörg Hoffmann
PICS
2001
13 years 10 months ago
Reduction of Bleed-through in Scanned Manuscript Documents
Many old manuscript documents were written on both sides of the paper, and the bleed-through from one side of the document to the other increases the difficulty in reading or deci...
Eric Dubois, Anita Pathak
WSC
2001
13 years 10 months ago
Ford's power train operations: changing the simulation environment
This paper discusses the changes that were required to Ford's Power Train Operations (PTO) simulation environment to ensure the maximum benefit was gained from the investment...
John Ladbrook, Annette Januszczak
ADHOC
2007
164views more  ADHOC 2007»
13 years 9 months ago
Attack-resilient time synchronization for wireless sensor networks
The existing time synchronization schemes in sensor networks were not designed with security in mind, thus leaving them vulnerable to security attacks. In this paper, we first id...
Hui Song, Sencun Zhu, Guohong Cao
AEI
2007
102views more  AEI 2007»
13 years 9 months ago
Incremental development of CBR strategies for computing project cost probabilities
This paper presents three CBR systems that have been developed over seven years in collaboration with two industrial partners. In this research, case based reasoning (CBR) is used...
Benny Raphael, Bernd Domer, Sandro Saitta, Ian F. ...