Sciweavers

1998 search results - page 88 / 400
» Situated Control Rules
Sort
View
PERCOM
2005
ACM
16 years 3 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
NIPS
1996
15 years 5 months ago
Reinforcement Learning for Mixed Open-loop and Closed-loop Control
Closed-loop control relies on sensory feedback that is usually assumed to be free. But if sensing incurs a cost, it may be coste ective to take sequences of actions in open-loop m...
Eric A. Hansen, Andrew G. Barto, Shlomo Zilberstei...
DEON
2008
Springer
15 years 5 months ago
Delegation of Control in Administrative Procedures
Abstract. Norms are implemented by administrative procedures. This paper addresses the delegation of control in administrative procedures. Instead of having to check all details, a...
Joris Hulstijn, Jianwei Liu, Yao-Hua Tan
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
15 years 5 months ago
Experimental verification of formation control with distributed cameras
Abstract-- Formation control experiments are performed using two robots, each equipped with a camera. When both robots are fully informed of the reference velocity, a decentralized...
He Bai, Karen D. Chapin, John Wason, John T. Wen
COMPUTING
2004
88views more  COMPUTING 2004»
15 years 3 months ago
Spline Curve Approximation and Design by Optimal Control Over the Knots
In [1] Optimal Control methods over re-parametrization for curve and surface design were introduced. The advantage of Optimal Control over Global Minimization such as in [17] is t...
Rony Goldenthal, Michel Bercovier