Sciweavers

1801 search results - page 200 / 361
» Pointing without a pointer
Sort
View
ICEIS
2007
IEEE
15 years 4 months ago
Challenges in Business Process Analysis
Business process analysis ranges from model verification at design-time to the monitoring of processes at run-time. Much progress has been achieved in process verification. Today...
Wil M. P. van der Aalst
ICRA
2007
IEEE
197views Robotics» more  ICRA 2007»
15 years 4 months ago
Detecting and Tracking Level Sets of Scalar Fields using a Robotic Sensor Network
— We introduce an algorithm which detects and traces a specified level set of a scalar field (a contour) on a plane. A network of static sensor nodes with limited communication...
Karthik Dantu, Gaurav S. Sukhatme
INFOCOM
2007
IEEE
15 years 4 months ago
Detecting Phantom Nodes in Wireless Sensor Networks
—In an adversarial environment, various kinds of security attacks become possible if malicious nodes could claim fake locations that are different from where they are physically ...
Joengmin Hwang, Tian He, Yongdae Kim
IPPS
2007
IEEE
15 years 4 months ago
Self Adaptive Application Level Fault Tolerance for Parallel and Distributed Computing
Most application level fault tolerance schemes in literature are non-adaptive in the sense that the fault tolerance schemes incorporated in applications are usually designed witho...
Zizhong Chen, Ming Yang, Guillermo A. Francia III,...
IROS
2007
IEEE
123views Robotics» more  IROS 2007»
15 years 4 months ago
Learning humanoid reaching tasks in dynamic environments
— A central challenging problem in humanoid robotics is to plan and execute dynamic tasks in dynamic environments. Given that the environment is known, sampling-based online moti...
Xiaoxi Jiang, Marcelo Kallmann