Sciweavers

19 search results - page 3 / 4
» A first approach to the closed-form specification and analys...
Sort
View
SIGMETRICS
2008
ACM
150views Hardware» more  SIGMETRICS 2008»
13 years 5 months ago
Performance of random medium access control, an asymptotic approach
Random Medium-Access-Control (MAC) algorithms have played an increasingly important role in the development of wired and wireless Local Area Networks (LANs) and yet the performanc...
Charles Bordenave, David McDonald, Alexandre Prout...
ICARCV
2006
IEEE
148views Robotics» more  ICARCV 2006»
13 years 11 months ago
Switched Linear Control of a Model Helicopter
—A mini scale helicopter poses a difficult control problem due to its complex dynamics. Compared to its full-size counterparts, the model helicopter exhibits not only increased s...
Herman Y. Sutarto, Agus Budiyono, Endra Joelianto,...
RIVF
2007
13 years 7 months ago
Human Heuristics for a Team of Mobile Robots
— This paper is at the crossroad of Cognitive Psychology and AI Robotics. It reports a cross-disciplinary project concerned about implementing human heuristics within autonomous ...
Charles Tijus, Elisabetta Zibetti, V. Besson, Nico...
JMLR
2006
169views more  JMLR 2006»
13 years 5 months ago
Bayesian Network Learning with Parameter Constraints
The task of learning models for many real-world problems requires incorporating domain knowledge into learning algorithms, to enable accurate learning from a realistic volume of t...
Radu Stefan Niculescu, Tom M. Mitchell, R. Bharat ...
CCS
2006
ACM
13 years 9 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...