Sciweavers

2968 search results - page 207 / 594
» Network Programming Using PLAN
Sort
View
ACSAC
1998
IEEE
15 years 7 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron
85
Voted
WSC
2000
15 years 4 months ago
Predicting enemy force closure with simulation
This paper presents a model and an analysis done to predict enemy force closure. The simulation replaces a pencil and ruler method that has been used by Department of Defense plan...
Mark R. Grabau, Michael D. Payne
119
Voted
KES
2007
Springer
15 years 9 months ago
Hybrid Agents Based Architecture on Automated Dynamic Environments
Abstract. This paper presents a hybrid agents based architecture that uses casebased reasoning and case-based planning systems as reasoning mechanism in deliberative BDI agents to ...
Dante I. Tapia, Javier Bajo, Juan M. Corchado, Sar...
ICAT
2006
IEEE
15 years 9 months ago
An Animation System for Imitation of Object Grasping in Virtual Reality
Interactive virtual characters are nowadays commonplace in games, animations, and Virtual Reality (VR) applications. However, relatively few work has so far considered the animatio...
Matthias Weber, Guido Heumer, Heni Ben Amor, Bernh...
ICRA
2009
IEEE
106views Robotics» more  ICRA 2009»
15 years 10 months ago
Stochastic strategies for a swarm robotic assembly system
— We present a decentralized, scalable approach to assembling a group of heterogeneous parts into different products using a swarm of robots. While the assembly plans are predete...
Loic Matthey, Spring Berman, Vijay Kumar