Sciweavers

149 search results - page 26 / 30
» Using a Cognitive Architecture to Automate Cyberdefense Reas...
Sort
View
CHARME
2001
Springer
133views Hardware» more  CHARME 2001»
15 years 2 months ago
View from the Fringe of the Fringe
Formal analysis remains outside the mainstream of system design practice. Interactive methods and tools are regarded by some to be on the margin of useful research in this area. Al...
Steven D. Johnson
ICRA
2008
IEEE
160views Robotics» more  ICRA 2008»
15 years 4 months ago
A constrained optimization approach to virtual fixtures for multi-handed tasks
— In this work, we have extended the concept of constrained motion control of robots to surgical tasks that require multiple robots. We present virtual fixtures to guide the mot...
Ankur Kapoor, Russell H. Taylor
ATAL
2006
Springer
15 years 1 months ago
Integrating agent-oriented methodologies with UML-AT
There are many methodological approaches for Agent-Oriented Software Engineering, each one focusing on some features of multi-agent systems, but leaving others underdefined. For t...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...
DAC
2002
ACM
15 years 10 months ago
Compiler-directed scratch pad memory hierarchy design and management
One of the primary challenges in embedded system design is designing the memory hierarchy and restructuring the application to take advantage of it. This task is particularly impo...
Mahmut T. Kandemir, Alok N. Choudhary
GIS
2008
ACM
15 years 10 months ago
Editing and versioning dynamic network models
Network data models are widely used to describe the connectivity between spatial features in GIS architectures. Recent applications demand that such models are editable in multius...
Petko Bakalov, Erik G. Hoel, Wee-Liang Heng, Vassi...