Sciweavers

2089 search results - page 170 / 418
» Finding Environment Guarantees
Sort
View
KI
2010
Springer
14 years 11 months ago
Towards Automatic Manipulation Action Planning for Service Robots
A service robot should be able to automatically plan manipulation actions to help people in domestic environments. Following the classic senseplan-act cycle, in this paper we prese...
Steffen W. Ruehl, Zhixing Xue, Thilo Kerscher, R&u...
TSP
2010
14 years 11 months ago
Cognitive radios with multiple antennas exploiting spatial opportunities
In this paper, the achievable rates of the so called "multiple-input multiple-output interference channel", exploited by a couple of single antenna primary terminals and...
Luca Bixio, Giacomo Oliveri, Marina Ottonello, Mir...
131
Voted
IACR
2011
137views more  IACR 2011»
14 years 4 months ago
Distance Hijacking Attacks on Distance Bounding Protocols
Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define and analyze a fourth main ...
Cas J. F. Cremers, Kasper Bonne Rasmussen, Srdjan ...
ICDE
2008
IEEE
168views Database» more  ICDE 2008»
16 years 5 months ago
On Supporting Kleene Closure over Event Streams
Complex event patterns involving Kleene closure are finding application in a variety of stream environments for tracking and monitoring purposes. In this paper, we propose a compac...
Daniel Gyllstrom, Jagrati Agrawal, Yanlei Diao, Ne...
SIGMOD
2006
ACM
132views Database» more  SIGMOD 2006»
16 years 4 months ago
Data integration through transform reuse in the Morpheus project
We discuss Morpheus, a data transformation construction tool and associated repository. The architecture of Morpheus is motivated by the goal to reuse (pieces of) previously writt...
Tiffany Dohzen, Mujde Pamuk, Seok-Won Seong, Joach...