Sciweavers

1643 search results - page 166 / 329
» Consistability: Describing Usually Consistent Systems
Sort
View
80
Voted
ECAI
1994
Springer
15 years 2 months ago
The DUAL Cognitive Architecture: A Hybrid Multi-Agent Approach
1 A hybrid (symbolic/connectionist) cognitive architecture, DUAL, is proposed. It is a multi-agent system which consist of a large number of non-cognitive, relatively simple agents...
Boicho N. Kokinov
CACM
2008
84views more  CACM 2008»
14 years 10 months ago
The emergence of a networking primitive in wireless sensor networks
The wireless sensor network community approached netabstractions as an open question, allowing answers to emerge with time and experience. The Trickle algorithm has become a basic...
Philip Levis, Eric A. Brewer, David E. Culler, Dav...
IVA
2009
Springer
15 years 4 months ago
Teaching Computers to Conduct Spoken Interviews: Breaking the Realtime Barrier with Learning
Abstract. Several challenges remain in the effort to build software capable of conducting realtime dialogue with people. Part of the problem has been a lack of realtime flexibili...
Gudny Ragna Jonsdottir, Kristinn R. Thóriss...
CAIP
1999
Springer
107views Image Analysis» more  CAIP 1999»
15 years 2 months ago
Adventurous Tourism for Couch Potatoes
Two tourist guides are described. One supports a virtual tour through an archaeological site, the other a tour through a real exhibition. The first system is based on the 3D recon...
Luc J. Van Gool, Tinne Tuytelaars, Marc Pollefeys
LISA
2000
14 years 11 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick