Sciweavers

4794 search results - page 895 / 959
» Trust-Based Mechanism Design
Sort
View
134
Voted
ISRR
2005
Springer
138views Robotics» more  ISRR 2005»
15 years 9 months ago
One Is Enough!
We postulate that multi-wheel statically-stable mobile robots for operation in human environments are an evolutionarydead end. Robots of this class tall enough to interact meaning...
Tom Lauwers, George Kantor, Ralph L. Hollis
KES
2005
Springer
15 years 9 months ago
Ontology Modeling and Storage System for Robot Context Understanding
Abstract. A mobile robot that interacts with its environment needs a machineunderstandable representation of objects and their usages. We present an ontology of objects, with gener...
Eric Wang, Yong Se Kim, Hak Soo Kim, Jin Hyun Son,...
MDM
2005
Springer
165views Communications» more  MDM 2005»
15 years 9 months ago
STEP: Self-Tuning Energy-safe Predictors
Data access prediction has been proposed as a mechanism to overcome latency lag, and more recently as a means of conserving energy in mobile systems. We present a fully adaptive p...
James Larkby-Lahet, Ganesh Santhanakrishnan, Ahmed...
RAID
2005
Springer
15 years 9 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
VLDB
2005
ACM
140views Database» more  VLDB 2005»
15 years 9 months ago
Loadstar: Load Shedding in Data Stream Mining
In this demo, we show that intelligent load shedding is essential in achieving optimum results in mining data streams under various resource constraints. The Loadstar system intro...
Yun Chi, Haixun Wang, Philip S. Yu