Sciweavers

345 search results - page 22 / 69
» When Systems Loose their Identity
Sort
View
JDCTA
2010
172views more  JDCTA 2010»
13 years 4 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
ICRA
2008
IEEE
141views Robotics» more  ICRA 2008»
14 years 4 months ago
Tracking interacting targets with laser scanner via on-line supervised learning
— Successful multi-target tracking requires locating the targets and labeling their identities. For the laser based tracking system, the latter becomes significantly more challen...
Xuan Song, Jinshi Cui, Xulei Wang, Huijing Zhao, H...
AI
2004
Springer
13 years 9 months ago
A unifying semantics for time and events
We give a formal semantics for a highly expressive language for representing temporal relationships and events. This language, which we call Versatile Event Logic (VEL), provides ...
Brandon Bennett, Antony Galton
ICRA
2005
IEEE
118views Robotics» more  ICRA 2005»
14 years 3 months ago
Calibration and Synchronization of a Robot-Mounted Camera for Fast Sensor-Based Robot Motion
— For precise control of robots along paths which are sensed online it is of fundamental importance to have a calibrated system. In addition to the identification of the sensor ...
Friedrich Lange, Gerd Hirzinger
WSC
1998
13 years 11 months ago
Input Modeling Tools for Complex Problems
A simulation model is composed of inputs and logic; the inputs represent the uncertainty or randomness in the system, while the logic determines how the system reacts to the uncer...
Barry L. Nelson, Michael Yamnitsky