Sciweavers

2645 search results - page 485 / 529
» Autonomous security for autonomous systems
Sort
View
AAAI
2006
15 years 1 months ago
Using an Ontology for Knowledge Acquisition
We describe an approach to distributed knowledge acquisition using an ontology. The ontology is used to represent and reason about soldier performance. These methods are embedded ...
Stacy Lovell, Webb Stacy
TMM
2010
152views Management» more  TMM 2010»
14 years 6 months ago
Network Awareness of P2P Live Streaming Applications: A Measurement Study
Abstract--Early P2P-TV systems have already attracted millions of users, and many new commercial solutions are entering this market. Little information is however available about h...
Delia Ciullo, M.-A. Garcia da Rocha Neta, Á...
ISRR
2005
Springer
149views Robotics» more  ISRR 2005»
15 years 5 months ago
Emergence, Exploration and Learning of Embodied Behavior
A novel model for dynamic emergence and adaptation of embodied behavior is proposed. A musculo-skeletal system is controlled by a number of chaotic elements, each of which driving...
Yasuo Kuniyoshi, Shinsuke Suzuki, Shinji Sangawa
CISIS
2010
IEEE
15 years 5 months ago
Resilient Critical Infrastructure Management Using Service Oriented Architecture
—The SERSCIS project aims to support the use of interconnected systems of services in Critical Infrastructure (CI) applications. The problem of system interconnectedness is aptly...
Martin Hall-May, Mike Surridge
DOLAP
2003
ACM
15 years 5 months ago
Achieving adaptivity for OLAP-XML federations
Motivated by the need for more flexible OLAP systems, this paper presents work on logical integration of external data in OLAP databases, carried out in cooperation between the D...
Dennis Pedersen, Torben Bach Pedersen