In practical applications of robot swarms with bio-inspired behaviors, a human operator will need to exert control over the swarm to fulfill the mission objectives. In many operational settings, human operators are re...
详细信息
ISBN:
(纸本)9783642353796;9783642353802
In practical applications of robot swarms with bio-inspired behaviors, a human operator will need to exert control over the swarm to fulfill the mission objectives. In many operational settings, human operators are remotely located and the communication environment is harsh. Hence, there exists some latency in information (or control command) transfer between the human and the swarm. In this paper, we conduct experiments of human-swarm interaction to investigate the effects of communication latency on the performance of a human-swarm system in a swarm foraging task. We develop and investigate the concept of neglect benevolence, where a human operator allows the swarm to evolve on its own and stabilize before giving new commands. Our experimental results indicate that operators exploited neglect benevolence in different ways to develop successful strategies in the foraging task. Furthermore, we show experimentally that the use of a predictive display can help mitigate the adverse effects of communication latency.
This article describes the actual status of Hungarian education of IT in elementary and high school, highlights the fact that Hungarian education doesn39;t follow the evolution of IT at a required pace. Authors thin...
详细信息
This article describes the actual status of Hungarian education of IT in elementary and high school, highlights the fact that Hungarian education doesn't follow the evolution of IT at a required pace. Authors think that fields of IT which are probably present in everyday life in the near future don't get enough stress. In the article a simple and cost-efficient suggestion is drafted to transfer knowledge related to programing and robotics.
Simulated environments often provide the first, and are usually the most frequent, test environment for robotic systems, primarily due to their cost and safety advantages. Unfortunately, changing aspects of both, the ...
详细信息
The proceedings contain 16 papers. The topics discussed include: secure scheduling of wireless video sensor nodes for surveillance applications;a hierarchical deterministic key pre-distribution for WSN using projectiv...
ISBN:
(纸本)9783642290954
The proceedings contain 16 papers. The topics discussed include: secure scheduling of wireless video sensor nodes for surveillance applications;a hierarchical deterministic key pre-distribution for WSN using projective planes;towards a complete multi-layered framework for IEEE-802.11e multi-hop ad hoc networks;towards realistic and credible wireless sensor network evaluation;adaptive hierarchical network structures for wireless sensor networks;algorithms on improving end-to-end connectivity and barrier coverage in stochastic network deployments;collaborative spectrum sensing scheme: quantized weighting with censoring;performance analysis of multichannel radio link control in MIMO systems;improving data dissemination in multi-hop cognitive radio ad-hoc networks;cooperative MAC scheduling in CDMA-MANETs with multiuser detection;MobileR: multi-hop energy efficient localised mobile georouting in wireless sensor and actuator networks;and neighbour selection and sensor knowledge: proactive approach for the frugal feeding problem in wireless sensor networks.
The proceedings contain 15 papers. The topics discussed include: android market analysis with activation patterns;gesture authentication with touch input for mobile devices;a context-aware privacy policy language for ...
ISBN:
(纸本)9783642302435
The proceedings contain 15 papers. The topics discussed include: android market analysis with activation patterns;gesture authentication with touch input for mobile devices;a context-aware privacy policy language for controlling access to context information of mobile users;android security permissions - can we trust them?;private pooling: a privacy-preserving approach for mobile collaborative sensing;agent based middleware for maintaining user privacy in IPTV recommender services;privacy enhanced device access;energy efficiency measurements of mobile virtualization systems;digital holography for security applications;can a mobile cloud be more trustworthy than a traditional cloud?;fingerprint recognition with embedded cameras on mobile phones;policy driven remote attestation;id-based deniable authentication protocol suitable for mobile devices;and mobile security with location-aware role-based access control.
An important challenge in CogInfoCom is how to design multi-sensory signals which are capable of communicating high-level information to users. Although there have been investigations on how to design groups of signal...
详细信息
An important challenge in CogInfoCom is how to design multi-sensory signals which are capable of communicating high-level information to users. Although there have been investigations on how to design groups of signals for this purpose (referred to as CogInfoCom channels), and how to map high-level concepts onto patterns of sensory signals across different modalities, one general question has still not been addressed: how should a system decide when to provide information to users in interactive CogInfoCom systems? This paper represents an attempt to bridge this gap, and to provide a taxonomy of CogInfoCom trigger types in order to help answer this question.
Biomedical ontologies such as the 11th revision of the international Classification of Diseases and others are increasingly produced with the help of collaborative ontology engineering platforms that facilitate cooper...
Biomedical ontologies such as the 11th revision of the international Classification of Diseases and others are increasingly produced with the help of collaborative ontology engineering platforms that facilitate cooperation and coordination among a large number of users and contributors. While collaborative approaches to engineering biomedical ontologies can be expected to yield a number of advantages, such as increased participation and coverage, they come with a number of novel challenges and risks. For example, they might suffer from low participation, lack of coordination, lack of control or other related problems that are neither well understood nor addressed by the current state of research. In this paper, we aim to tackle some of these problems by exploring techniques for recommending concepts to experts on collaborative ontology engineering platforms. In detail, this paper will (i) discuss different recommendation techniques from the literature (ii) map and apply these categories to the domain of collaboratively engineered biomedical ontologies and (iii) present prototypical implementations of selected recommendation techniques as a proof-of-concept.
Clustering is a crucial network design approach to enable large-scale wireless sensor networks (WSNs) deployments. A large variety of clustering approaches has been presented focusing on various aspect such as minimiz...
详细信息
In this paper we present a distributed localized algorithm for the problem, where a group of autonomous mobile robots have to capture a target by forming a circle around it. The robots do not have memory of the past (...
详细信息
In this paper we present a distributed localized algorithm for the problem, where a group of autonomous mobile robots have to capture a target by forming a circle around it. The robots do not have memory of the past (oblivious) and only use local sensing. Dedicated communication between the robots is not needed. We introduce the discrete multi-orbit target surrounding problem and present a solution for it. We prove that our solution always guarantees that the robots enclose the target and circulate around it in O(D) time, where D is the sum of distances of the robots from the target in the start configuration. We also evaluate our solution by simulations.
Data warehouse fragmentation is one of the main problems in distributed data warehouse (DDW) *** first step in DDW design,which in fact affects overall solution,is the definition of *** this work we present our approa...
详细信息
Data warehouse fragmentation is one of the main problems in distributed data warehouse (DDW) *** first step in DDW design,which in fact affects overall solution,is the definition of *** this work we present our approach to improve fragment allocation by their ordering before allocation process.
暂无评论