Sciweavers

5948 search results - page 1014 / 1190
» Computing Robust Counter-Strategies
Sort
View
156
Voted
ICMCS
2006
IEEE
181views Multimedia» more  ICMCS 2006»
15 years 9 months ago
Human Object Tracking Algorithm with Human Color Structure Descriptor for Video Surveillance Systems
Segmentation, tracking, and description extraction are important operations in smart camera surveillance systems. In this paper, a robust segmentation-and-descriptor based trackin...
Shao-Yi Chien, Wei-Kai Chan, Der-Chun Cherng, Jing...
134
Voted
ICNP
2006
IEEE
15 years 9 months ago
Vault: A Secure Binding Service
— Binding services are crucial building blocks in networks and networked applications. A binding service (e.g., the Domain Name System (DNS)) maps certain information, namely, bi...
Guor-Huar Lu, Changho Choi, Zhi-Li Zhang
107
Voted
ICRA
2006
IEEE
124views Robotics» more  ICRA 2006»
15 years 9 months ago
Stereo based Obstacle Detection for an Unmanned Air Vehicle
— This paper presents the Visual Threat Awareness (VISTA) system for real time collision obstacle detection for an unmanned air vehicle (UAV). Computational stereo performance ha...
Jeffrey Byrne, Martin Cosgrove, Raman K. Mehra
120
Voted
ICRA
2006
IEEE
128views Robotics» more  ICRA 2006»
15 years 9 months ago
Distributed Construction by Mobile Robots with Enhanced Building Blocks
— We describe a system in which autonomous robots assemble two-dimensional structures out of square building blocks. A fixed set of local control rules is sufficient for a grou...
Justin Werfel, Yaneer Bar-Yam, Daniela Rus, Radhik...
161
Voted
ICTAI
2006
IEEE
15 years 9 months ago
Polynomial Regression with Automated Degree: A Function Approximator for Autonomous Agents
In order for an autonomous agent to behave robustly in a variety of environments, it must have the ability to learn approximations to many different functions. The function approx...
Daniel Stronger, Peter Stone
« Prev « First page 1014 / 1190 Last » Next »