Sciweavers

37 search results - page 7 / 8
» Human brain-teleoperated robot between remote places
Sort
View
SOUPS
2005
ACM
13 years 11 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
ICRA
2008
IEEE
160views Robotics» more  ICRA 2008»
13 years 11 months ago
A constrained optimization approach to virtual fixtures for multi-handed tasks
— In this work, we have extended the concept of constrained motion control of robots to surgical tasks that require multiple robots. We present virtual fixtures to guide the mot...
Ankur Kapoor, Russell H. Taylor
JCIT
2007
192views more  JCIT 2007»
13 years 5 months ago
Action Representation for Natural Language Interfaces to Agent Systems
In this paper, we outline a framework for the development of natural language interfaces to agent systems with a focus on action representation. The architecture comprises a natur...
Christel Kemke
GECCO
2009
Springer
113views Optimization» more  GECCO 2009»
13 years 12 months ago
Environmental robustness in multi-agent teams
Evolution has proven to be an effective method of training heterogeneous multi-agent teams of autonomous agents to explore unknown environments. Autonomous, heterogeneous agents ...
Terence Soule, Robert B. Heckendorn
VRML
1995
ACM
13 years 8 months ago
Internetwork Infrastructure Requirements for Virtual Environments
Virtual environments (VEs) are a broad multidisciplinary research area that includes all aspects of computer science, virtual reality, virtual worlds, teleoperation and telepresenc...
Donald P. Brutzman, Michael R. Macedonia, Michael ...