Sciweavers

1948 search results - page 292 / 390
» Formalizing Mirror Theory
Sort
View
ICDCSW
2007
IEEE
15 years 6 months ago
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks
In this paper, we consider the problem of reducing the number of false positives generated by cooperative Intrusion Detection Systems (IDSs) in Mobile Ad hoc Networks (MANETs). We...
Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bha...
ICRA
2007
IEEE
131views Robotics» more  ICRA 2007»
15 years 6 months ago
Simulation Issues in Haptics
Abstract— In this paper, two problems related to the simulation of virtual environments for haptic systems are considered. The first problem is how to simulate, in discrete time...
Gianni Borghesan, Alessandro Macchelli, Claudio Me...
79
Voted
IROS
2007
IEEE
149views Robotics» more  IROS 2007»
15 years 6 months ago
Kernel-based visual servoing
— Traditionally, visual servoing is separated into tracking and control subsystems. This separation, though convenient, is not necessarily well justified. When tracking and cont...
Vinutha Kallem, Maneesh Dewan, John P. Swensen, Gr...
ATAL
2007
Springer
15 years 6 months ago
Diagnosis of plan step errors and plan structure violations
Failures in plan execution can be attributed to errors in the execution of plan steps or violations of the plan structure. The structure of a plan prescribes which actions have to...
Cees Witteveen, Nico Roos, Adriaan ter Mors, Xiaoy...
ATAL
2007
Springer
15 years 6 months ago
Enacting protocols by commitment concession
Commitment protocols formalize interactions among autonomous, heterogeneous agents, leaving the agents’ local policies unspecified. This paper studies the problem of agents ena...
Pinar Yolum, Munindar P. Singh