Sciweavers

388 search results - page 36 / 78
» autonomics 2009
Sort
View
CISIS
2009
IEEE
14 years 4 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
ICDE
2009
IEEE
108views Database» more  ICDE 2009»
14 years 4 months ago
Galaxy: Encouraging Data Sharing among Sources with Schema Variants
This demonstration presents Galaxy, a schema manager that facilitates easy and correct data sharing among autonomous but related, evolving data sources. Galaxy reduces heterogenei...
Peter Mork, Len Seligman, Arnon Rosenthal, Michael...
HRI
2009
ACM
14 years 4 months ago
Creating and using matrix representations of social interaction
This paper explores the use of an outcome matrix as a computational representation of social interaction suitable for implementation on a robot. An outcome matrix expresses the re...
Alan R. Wagner
HYBRID
2009
Springer
14 years 4 months ago
Periodically Controlled Hybrid Systems
Abstract. This paper introduces Periodically Controlled Hybrid Automata (PCHA) for describing a class of hybrid control systems. In a PCHA, control actions occur roughly periodical...
Tichakorn Wongpiromsarn, Sayan Mitra, Richard M. M...
ICDCN
2009
Springer
14 years 4 months ago
A Mechanism to Structure Mission-Aware Interaction in Mobile Sensor Networks
One of the main appeals of mobile sensors is the variety of environments in which they can operate as an autonomous network. Different environments, however, present different ch...
Michel Charpentier, Radim Bartos, Swapnil Bhatia