Sciweavers

5684 search results - page 910 / 1137
» Computing with active dendrites
Sort
View
ICEBE
2009
IEEE
147views Business» more  ICEBE 2009»
15 years 11 months ago
The Design and Implementation of Service Reservations in Real-Time SOA
—Service-oriented architecture (SOA) provides the flexibility of dynamically composing business processes in enterprise computing. However, they must be enhanced to support real...
Mark Panahi, Weiran Nie, Kwei-Jay Lin
ICNP
2009
IEEE
15 years 11 months ago
Topology Control Protocol Using Sectorized Antennas in Dense 802.11 Wireless Networks
—We introduce a measurement-based optimization framework for topology control in dense 802.11 networks using sectorized antennas. We first formulate a topology control optimizat...
Anand Prabhu Subramanian, Henrik Lundgren, Theodor...
ICRA
2009
IEEE
147views Robotics» more  ICRA 2009»
15 years 11 months ago
Generating Robot/Agent backchannels during a storytelling experiment
Abstract— This work presents the development of a realtime framework for the research of Multimodal Feedback of Robots/Talking Agents in the context of Human Robot Interaction (H...
Sames Al Moubayed, Malek Baklouti, Mohamed Chetoua...
IROS
2009
IEEE
212views Robotics» more  IROS 2009»
15 years 11 months ago
3D feature based mapping towards mobile robots' enhanced performance in rescue missions
— This paper presents a feature based 3D mapping approach with regard to obtaining compact models of semistructured environments such as partially destroyed buildings where mobil...
Paloma de la Puente, Diego Rodríguez-Losada...
WEBI
2009
Springer
15 years 11 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham