Sciweavers

SMC
2010
IEEE
228views Control Systems» more  SMC 2010»
13 years 10 months ago
A safe communication scheme for an intelligent Wireless Networked Control System Coordination Agent
Abstract— Wireless networked control systems have begun to gain acceptance during the last decade, largely due to the increased flexibility and lower costs they promise to provi...
James H. Taylor, Hazem M. S. Ibrahim, Jeff Slipp, ...
SMC
2010
IEEE
128views Control Systems» more  SMC 2010»
13 years 10 months ago
Detailed requirements for robots in autism therapy
—Robot-based autism therapy is a rapidly developing area of research, with a wide variety of robots being developed for use in clinical settings. Specific, detailed requirements ...
Nicole Giullian, Daniel J. Ricks, Alan Atherton, M...
SMC
2010
IEEE
276views Control Systems» more  SMC 2010»
13 years 10 months ago
A Modified Invasive Weed Optimization Algorithm for training of feed- forward Neural Networks
— Invasive Weed Optimization Algorithm IWO) is an ecologically inspired metaheuristic that mimics the process of weeds colonization and distribution and is capable of solving mul...
Ritwik Giri, Aritra Chowdhury, Arnob Ghosh, Swagat...
SMC
2010
IEEE
159views Control Systems» more  SMC 2010»
13 years 10 months ago
Mobile interaction with smart environments through linked data
This paper presents the design and architecture of an integrated environment that provides location independent and mobile access to Intelligent Domotic Environments. The envision...
Faisal Razzak, Dario Bonino, Fulvio Corno
SMC
2010
IEEE
143views Control Systems» more  SMC 2010»
13 years 10 months ago
Estimating of Bellman function via suboptimal strategies
—The paper concerns approximate dynamic decision making. It deals with solving Bellman equation to obtain the Bellman function via so-called suboptimal strategies. The suboptimal...
Jan Zeman
SMC
2010
IEEE
198views Control Systems» more  SMC 2010»
13 years 10 months ago
Deep web data extraction
—Deep Web contents are accessed by queries submitted to Web databases and the returned data records are enwrapped in dynamically generated Web pages (they will be called deep Web...
Jer Lang Hong
SMC
2010
IEEE
121views Control Systems» more  SMC 2010»
13 years 10 months ago
Learning of personalized security settings
—While many cybersecurity tools are available to computer users, their default configurations often do not match needs of specific users. Since most modern users are not computer...
Mehrbod Sharifi, Eugene Fink, Jaime G. Carbonell
SMC
2010
IEEE
198views Control Systems» more  SMC 2010»
13 years 10 months ago
Fast tracking of natural textures using fractal snakes
Abstract — The natural environments that robotic applications often encounter can present difficult problems for imagebased task execution. Prior efforts have used both grayscale...
Christopher E. Smith
SMC
2010
IEEE
157views Control Systems» more  SMC 2010»
13 years 10 months ago
Business Continuity management system that supports progress management and operational planning
— Japan is known as an “earthquake country” and hence both companies and governments require an operation management method called BCM to ensure that operations and services ...
Seigo Kawamura, Yoshio Nakatani
SMC
2010
IEEE
186views Control Systems» more  SMC 2010»
13 years 10 months ago
Semantic enrichment of text representation with wikipedia for text classification
—Text classification is a widely studied topic in the area of machine learning. A number of techniques have been developed to represent and classify text documents. Most of the t...
Hiroki Yamakawa, Jing Peng, Anna Feldman