Sciweavers

412 search results - page 66 / 83
» An evaluation of timed scenario notations
Sort
View
CIDR
2011
188views Algorithms» more  CIDR 2011»
14 years 3 months ago
Managing Structured Collections of Community Data
Data management is becoming increasingly social. We observe a new form of information in such collaborative scenarios, where users contribute and reuse information, which resides ...
Wolfgang Gatterbauer, Dan Suciu
AAAI
2012
13 years 2 months ago
Discovering Constraints for Inductive Process Modeling
Scientists use two forms of knowledge in the construction of explanatory models: generalized entities and processes that relate them; and constraints that specify acceptable combi...
Ljupco Todorovski, Will Bridewell, Pat Langley
MOBIHOC
2005
ACM
15 years 11 months ago
The feasibility of launching and detecting jamming attacks in wireless networks
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitt...
Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wo...
MICAI
2009
Springer
15 years 6 months ago
People Detection by a Mobile Robot Using Stereo Vision in Dynamic Indoor Environments
People detection and tracking is a key issue for social robot design and effective human robot interaction. This paper addresses the problem of detecting people with a mobile robo...
José Alberto Méndez-Polanco, Ang&eac...
GECCO
2005
Springer
155views Optimization» more  GECCO 2005»
15 years 5 months ago
Mission planning for joint suppression of enemy air defenses using a genetic algorithm
In this paper we present a genetic algorithm applied to the problem of mission planning for Joint Suppression of Enemy Air Defenses (JSEAD) in support of air strike operations. Th...
Jeffrey P. Ridder, Jason C. HandUber