Sciweavers

1036 search results - page 102 / 208
» Utilizing Validation Experience for System Validation
Sort
View
RAID
2004
Springer
14 years 1 months ago
Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix
Anomaly detection is a promising approach to detecting intruders masquerading as valid users (called masqueraders). It creates a user profile and labels any behavior that deviates...
Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhik...
ICES
2003
Springer
79views Hardware» more  ICES 2003»
14 years 1 months ago
Using Genetic Programming to Generate Protocol Adaptors for Interprocess Communication
Abstract. As mobile devices become more powerful, interprocess communication becomes increasingly more important. Unfortunately, this larger freedom of mobility gives rise to unkno...
Werner Van Belle, Tom Mens, Theo D'Hondt
ICRA
2002
IEEE
148views Robotics» more  ICRA 2002»
14 years 24 days ago
Perception Errors in Vision Guided Walking: Analysis, Modeling, and Filtering
This article deals with specific aspects concerning the visual perception process of a humanoid walking machine. An active vision system provides the information about the enviro...
Oliver Lorch, Javier F. Seara, Klaus H. Strobl, Uw...
ICRA
2002
IEEE
115views Robotics» more  ICRA 2002»
14 years 24 days ago
Coordination of Multiple Mobile Robots in an Object Carrying Task using Implicit Communication
Abstract — This paper addresses the problem of coordinating multiple mobile robots in a tightly coupled task by means of implicit communication. This approach allows the developm...
Guilherme A. S. Pereira, Bruno S. Pimentel, Luiz C...
PODC
2009
ACM
14 years 16 days ago
Brief announcement: locality-based aggregate computation in wireless sensor networks
We present DRR-gossip, an energy-efficient and robust aggregate computation algorithm in wireless sensor networks. We prove that the DRR-gossip algorithm requires O(n) messages a...
Jen-Yeu Chen, Gopal Pandurangan, Jianghai Hu