Sciweavers

45 search results - page 6 / 9
» A framework to support multiple reconfiguration strategies
Sort
View
TEC
2008
104views more  TEC 2008»
14 years 9 months ago
Genetic-Fuzzy Data Mining With Divide-and-Conquer Strategy
Data mining is most commonly used in attempts to induce association rules from transaction data. Most previous studies focused on binary-valued transaction data. Transaction data i...
Tzung-Pei Hong, Chun-Hao Chen, Yeong-Chyi Lee, Yu-...
CHI
2011
ACM
14 years 1 months ago
Deep shot: a framework for migrating tasks across devices using mobile phone cameras
A user task often spans multiple heterogeneous devices, e.g., working on a PC in the office and continuing the work on a laptop or a mobile phone while commuting on a shuttle. How...
Tsung-Hsiang Chang, Yang Li
ICRA
2010
IEEE
106views Robotics» more  ICRA 2010»
14 years 8 months ago
Generalized direction changing fall control of humanoid robots among multiple objects
— Humanoid robots are expected to share human environments in the future and it is important to ensure safety of their operation. A serious threat to safety is the fall of a huma...
Umashankar Nagarajan, Ambarish Goswami
EUMAS
2006
14 years 11 months ago
Goal-Oriented Agent Patterns with the PRACTIONIST Framework
When developing BDI agent-based systems, some design patterns such as incompatible intentions, multiple strategies, intention decomposition, etc. would be very useful for specifyi...
Vito Morreale, Giuseppe Francaviglia, Fabio Centin...
CNSM
2010
14 years 6 months ago
Risk management in VoIP infrastructures using support vector machines
Telephony over IP is exposed to multiple security threats. Conventional protection mechanisms do not fit into the highly dynamic, open and large-scale settings of VoIP infrastructu...
Mohamed Nassar, Oussema Dabbebi, Remi Badonnel, Ol...