Sciweavers

381 search results - page 24 / 77
» Alpha-integration of multiple evidence
Sort
View
ML
2002
ACM
100views Machine Learning» more  ML 2002»
14 years 10 months ago
Structure in the Space of Value Functions
Solving in an efficient manner many different optimal control tasks within the same underlying environment requires decomposing the environment into its computationally elemental ...
David J. Foster, Peter Dayan
TC
1998
14 years 10 months ago
Resilient Authentication Using Path Independence
—Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating channels in a large distribut...
Michael K. Reiter, Stuart G. Stubblebine
SMC
2010
IEEE
134views Control Systems» more  SMC 2010»
14 years 9 months ago
Beyond robot fan-out: Towards multi-operator supervisory control
Abstract—This paper explores multi-operator supervisory control (MOSC) of multiple independent robots using two complementary approaches: a human factors experiment and an agent-...
Jonathan M. Whetten, Michael A. Goodrich, Yisong G...
ICRA
2010
IEEE
145views Robotics» more  ICRA 2010»
14 years 9 months ago
Unsupervised discovery of repetitive objects
We present a novel approach for unsupervised discovery of repetitive objects from 3D point clouds. Our method assumes that objects are geometrically consistent, and uses multiple o...
Jiwon Shin, Rudolph Triebel, Roland Siegwart
ICWSM
2009
14 years 8 months ago
Connecting Corresponding Identities across Communities
One of the most interesting challenges in the area of social computing and social media analysis is the so-called community analysis. A well known barrier in cross-community (mult...
Reza Zafarani, Huan Liu