Sciweavers

8658 search results - page 1455 / 1732
» Models of Command and Control
Sort
View
154
Voted
INFOCOM
2010
IEEE
15 years 3 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
JOCN
2010
96views more  JOCN 2010»
15 years 3 months ago
Action Preparation Helps and Hinders Perception of Action
■ Several theories of the mechanisms linking perception and action require that the links are bidirectional, but there is a lack of consensus on the effects that action has on p...
Clare Press, Elena Gherri, Cecilia Heyes, Martin E...
SIAMCOMP
2010
83views more  SIAMCOMP 2010»
15 years 3 months ago
Reaching and Distinguishing States of Distributed Systems
Some systems interact with their environment at physically distributed interfaces, called ports, and in testing such a system it is normal to place a tester at each port. Each test...
Robert M. Hierons
141
Voted
SIMPRA
2010
110views more  SIMPRA 2010»
15 years 3 months ago
Singularity-free dynamic equations of vehicle-manipulator systems
In this paper we derive the singularity-free dynamic equations of vehiclemanipulator systems using a minimal representation. These systems are normally modeled using Euler angles,...
Pål Johan From, Vincent Duindam, Kristin Ytt...
CDC
2009
IEEE
170views Control Systems» more  CDC 2009»
15 years 2 months ago
ESMF based multiple UAVs active cooperative observation method in relative velocity coordinates
based on extended set-membership filter (ESMF) and the path planning method in relative velocity coordinates (RVCs), a new 3D multiple Unmanned Aerial Vehicle (UAV) systems active ...
Feng Gu, Yuqing He, Jianda Han, Yuechao Wang
« Prev « First page 1455 / 1732 Last » Next »