Sciweavers

1998 search results - page 170 / 400
» Situated Control Rules
Sort
View
RSA
2010
89views more  RSA 2010»
15 years 3 months ago
A system of grabbing particles related to Galton-Watson trees
We consider a system of particles with arms that are activated randomly to grab other particles as a toy model for polymerization. We assume that the following two rules are fulï¬...
Jean Bertoin, Vladas Sidoravicius, Maria Eulalia V...
CORR
2011
Springer
190views Education» more  CORR 2011»
14 years 8 months ago
Compiling Causal Theories to Successor State Axioms and STRIPS-Like Systems
We describe a system for specifying the effects of actions. Unlike those commonly used in AI planning, our system uses an action description language that allows one to specify t...
Fangzhen Lin
154
Voted
CBMS
2007
IEEE
15 years 11 months ago
A Large Scale Data Mining Approach to Antibiotic Resistance Surveillance
One of the most considerable functions in a hospital's infection control program is the surveillance of antibiotic resistance. Several traditional methods used to measure it ...
Eugenia G. Giannopoulou, Vasileios P. Kemerlis, Mi...
RSP
2007
IEEE
158views Control Systems» more  RSP 2007»
15 years 11 months ago
SPP-NIDS - A Sea of Processors Platform for Network Intrusion Detection Systems
A widely used approach to avoid network intrusion is SNORT, an open source Network Intrusion Detection System (NIDS). This work describes SPP-NIDS, a architecture for intrusion de...
Luis Carlos Caruso, Guilherme Guindani, Hugo Schmi...
EEE
2005
IEEE
15 years 10 months ago
SLA Representation, Management and Enforcement
As the IT industry is becoming more and more interested in service oriented business models and upcoming technologies like Web Services or Grid Computing, the need for automated c...
Adrian Paschke, Martin Bichler