Sciweavers

255 search results - page 46 / 51
» The Reconstruction of a Mobile Agent Computation and Its Val...
Sort
View
ICRA
2003
IEEE
165views Robotics» more  ICRA 2003»
15 years 2 months ago
Multi-robot task-allocation through vacancy chains
Existing task allocation algorithms generally do not consider the effects of task interaction, such as interference, but instead assume that tasks are independent. That assumptio...
Torbjørn S. Dahl, Maja J. Mataric, Gaurav S...
KI
2001
Springer
15 years 1 months ago
Extracting Situation Facts from Activation Value Histories in Behavior-Based Robots
The paper presents a new technique for extracting symbolic ground facts out of the sensor data stream in autonomous robots for use under hybrid control architectures, which compris...
Frank Schönherr, Mihaela Cistelecan, Joachim ...
ATAL
2007
Springer
15 years 3 months ago
Locating RF emitters with large UAV teams
This chapter describes a principled, yet computationally efficient way for a team of UAVs with Received Signal Strength Indicator (RSSI) sensors to locate radio frequency emitting...
Paul Scerri, Robin Glinton, Sean Owens, Steven Oka...
WSC
2008
14 years 11 months ago
Modeling and simulation of e-mail social networks: A new stochastic agent-based approach
Understanding how the structure of a network evolves over time is one of the most interesting and complex topics in the field of social networks. In our attempt to model the dynam...
Fabian Menges, Bud Mishra, Giuseppe Narzisi
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
14 years 7 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero