Sciweavers

AIPS
2011
14 years 8 months ago
Visual Programming of Plan Dynamics Using Constraints and Landmarks
In recent years, there has been considerable interest in the use of planning techniques in new media and computer games. Many traditional planning notions no longer apply in the c...
Julie Porteous, Jonathan Teutenberg, David Pizzi, ...
AIPS
2011
14 years 8 months ago
Effective Heuristics and Belief Tracking for Planning with Incomplete Information
Conformant planning can be formulated as a path-finding problem in belief space where the two main challenges are the heuristics to guide the search, and the representation and u...
Alexandre Albore, Miquel Ramírez, Hector Ge...
AIPS
2011
14 years 8 months ago
Planning to Perceive: Exploiting Mobility for Robust Object Detection
Consider the task of a mobile robot autonomously navigating through an environment while detecting and mapping objects of interest using a noisy object detector. The robot must re...
Javier Vélez, Garrett Hemann, Albert S. Hua...
AINA
2011
IEEE
14 years 8 months ago
Non-invasive Browser Based User Modeling Towards Semantically Enhanced Personlization of the Open Web
—Currently the user’s web search is disjoint from the resources which is subsequently browsed. Specifically the related instances of the search are not displayed on the followi...
Kevin Koidl, Owen Conlan, Lai Wei, Ann Marie Saxto...
AINA
2011
IEEE
14 years 8 months ago
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence
—The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security po...
Julian Schütte, Stephan Heuser
AINA
2011
IEEE
14 years 8 months ago
Identity Support in a Security and Trust Service for Ad Hoc M-commerce Trading Systems
– Ad hoc m-commerce is an emerging way of conducting online trading wirelessly within dynamic network communities. However, participants in such systems are vulnerable to attacks...
Husna Osman, Hamish Taylor
AINA
2011
IEEE
14 years 8 months ago
Exploring Multi-homing Issues in Heterogeneous Environments
—Mobile devices with two network interfaces (WiFi and 3G) are already commercially available. Pointto-point communications such as Infrared and Bluetooth are also readily used. I...
Glenford E. Mapp, Mahdi Aiash, Hélio Cresta...
AINA
2011
IEEE
14 years 8 months ago
Data Caching for Enhancing Anonymity
—The benefits of caching for reducing access time to frequently needed data, in order to improve system performance, are already well-known. In this paper, a proposal for employ...
Rajiv Bagai, Bin Tang
AINA
2011
IEEE
14 years 8 months ago
Power Adaptive Cognitive Pilot Channel for Spectrum Co-existence in Wireless Networks
— Next generation wireless networks will be heterogeneous, where several primary users (PU e.g. licensed users) and secondary users (SU e.g. unlicensed users) can operate in the ...
Md. Akbar Hossain, Roberto Passerone
AIMS
2011
Springer
14 years 8 months ago
Finding and Analyzing Evil Cities on the Internet
Abstract. IP Geolocation is used to determine the geographical location of Internet users based on their IP addresses. When it comes to security, most of the traditional geolocatio...
Matthijs G. T. van Polen, Giovane Cesar Moreira Mo...