Sciweavers

2650 search results - page 277 / 530
» Simulation and Control of Reactive Systems
Sort
View
HICSS
2003
IEEE
151views Biometrics» more  HICSS 2003»
15 years 9 months ago
A Simple GSPN for Modeling Common Mode Failures in Critical Infrastructures
It is now apparent that our nation’s infrastructures and essential utilities have been optimized for reliability in benign operating environments. As such, they are susceptible ...
Axel W. Krings, Paul W. Oman
JMLR
2002
125views more  JMLR 2002»
15 years 4 months ago
Lyapunov Design for Safe Reinforcement Learning
Lyapunov design methods are used widely in control engineering to design controllers that achieve qualitative objectives, such as stabilizing a system or maintaining a system'...
Theodore J. Perkins, Andrew G. Barto
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
15 years 10 months ago
Evolving computer intrusion scripts for vulnerability assessment and log analysis
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks a...
Julien Budynek, Eric Bonabeau, Ben Shargel
ICRA
2005
IEEE
166views Robotics» more  ICRA 2005»
15 years 10 months ago
Bilateral Teleoperation of Multiple Cooperative Robots over Delayed Communication Networks: Theory
Abstract— We propose a control framework for the bilateral teleoperation between a single master robot and multiple cooperative slave robots with communication-delay in the maste...
Dongjun Lee, Mark W. Spong
ISER
2004
Springer
172views Robotics» more  ISER 2004»
15 years 10 months ago
Autonomous Navigation Results from the Mars Exploration Rover (MER) Mission
In January, 2004, the Mars Exploration Rover (MER) mission landed two rovers, Spirit and Opportunity, on the surface of Mars. Several autonomous navigation capabilities were employ...
Mark W. Maimone, Andrew Edie Johnson, Yang Cheng, ...