Protocols for distributed systems make often use of random transitions to achieve a common goal. A popular example are randomized leader election protocols. We introduce probabilis...
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Abstract. Knowledge has become the most strategic resource in the new business environment. A case-based reasoning system, which incorporates a novel clustering and retrieval metho...
Emilio Corchado, Juan M. Corchado, Lourdes S&aacut...
We describe a model-based object tracking system that updates the configuration parameters of an object model based upon information gathered from a sequence of monocular images. ...
– Active SLAM poses the challenge for an autonomous robot to plan efficient paths simultaneous to the SLAM process. The uncertainties of the robot, map and sensor measurements, a...