Search results for " computing"

showing 10 items of 2075 documents

An Auto-Operated Telepresence System for the Nao Humanoid Robot

2013

International audience; This paper presents the development process of an auto-operated telepresence system for the Nao humanoid robot with the main functionality of directing the robot autonomously to an operator-defined target location within a static workspace. The workspace is observed by an array of top-view cameras, which are used to localize the robot by means of a color-based marker detection technique. The system is accessible world-wide to the remote operator through any Internet-capable device via a web-based control interface. The web server responsible for coordinating the communication between system and operator is hosted on a cloud-based infrastructure online. The system was…

0209 industrial biotechnologyTeleroboticsSocial robotbusiness.industryComputer scienceInterface (computing)Real-time computingMobile robot02 engineering and technologyWorkspace020901 industrial engineering & automation[INFO.INFO-TI] Computer Science [cs]/Image Processing [eess.IV]Embedded system[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV]Teleoperation[ INFO.INFO-TI ] Computer Science [cs]/Image Processing0202 electrical engineering electronic engineering information engineeringRobot020201 artificial intelligence & image processingbusinessHumanoid robot
researchProduct

Consensus via multi-population robust mean-field games

2017

In less prescriptive environments where individuals are told ‘what to do’\ud but not ‘how to do’, synchronization can be a byproduct of strategic thinking,\ud prediction, and local interactions. We prove this in the context of multipopulation\ud robust mean-field games. The model sheds light on a multi-scale\ud phenomenon involving fast synchronization within the same population and\ud slow inter-cluster oscillation between different populations.

0209 industrial biotechnologyTheoretical computer scienceGeneral Computer ScienceComputer scienceDistributed computingPopulationConsensuContext (language use)02 engineering and technologySynchronizationMean-field games01 natural sciences020901 industrial engineering & automationPhenomenonSynchronization (computer science)Oscillation (cell signaling)0101 mathematicsElectrical and Electronic Engineeringeducationeducation.field_of_studySynchronization; Consensus; Mean-field gamesStrategic thinkingMechanical Engineering010102 general mathematicsMean field theoryControl and Systems EngineeringMulti populationSettore MAT/09 - Ricerca OperativaSystems & Control Letters
researchProduct

Tolerating malicious monitors in detecting misbehaving robots

2008

This paper considers a multi–agent system and focuses on the detection of motion misbehavior. Previous work by the authors proposed a solution, where agents act as local monitors of their neighbors and use locally sensed information as well as data received from other monitors. In this work, we consider possible failure of monitors that may send incorrect information to their neighbors due to spontaneous or even malicious malfunctioning. In this context, we propose a distributed software architecture that is able to tolerate such failures. Effectiveness of the proposed solution is shown through preliminary simulation results.

0209 industrial biotechnologybusiness.industryComputer scienceDistributed computing020206 networking & telecommunicationsContext (language use)security02 engineering and technologyMotion (physics)consensus algorithm020901 industrial engineering & automationSettore ING-INF/04 - AutomaticaWork (electrical)Embedded system0202 electrical engineering electronic engineering information engineeringRobotDistributed software architectureIntrusion detectionmulti-agent systemsSoftware architecturebusiness
researchProduct

Towards Shipping 4.0. A preliminary gap analysis

2020

Abstract The paradigm of Industry 4.0 involves a substantial innovation to the value creation approach thought the supply chain and the application of digital enabling technologies like the Internet of Things (IoT), Big Data Analytics (BDA) and cloud computing. The fourth industrial revolution is thus expected to have a disruptive impact on maritime transport and shipping sectors, where smart ships and autonomous vessels well be part of a new and fully interconnected maritime ecosystem. Specific hardware components, such as sensors, actuators, or processors will be embedded in the ship’s key systems in order to provide valuable information to increase the efficiency, sustainability and safe…

0209 industrial biotechnologysmart shipBig Data Analytics (BDA)business.industryComputer scienceSupply chainBig dataCloud computing02 engineering and technologyGap analysisBusiness modelIndustry 4.0Maturity (finance)Industrial and Manufacturing EngineeringInternet of Things (IoT)Engineering management020303 mechanical engineering & transports020901 industrial engineering & automation0203 mechanical engineeringArtificial IntelligenceSettore ING-IND/17 - Impianti Industriali MeccaniciSustainabilityValue chainbusinessProcedia Manufacturing
researchProduct

Tabu Search to Plan Schedules in a Multiskill Customer Contact Center

2006

International audience; We have studied a realistic case of scheduling problem in a customer contact center, dealing with multiskill agents. Our model combines the last two steps of the standard approach by determining shifts and by assigning them to agents at the same time (scheduling and rostering). Moreover, we have considered realistic vacations, according to legal constraints and preferences of agents. We have envisioned entire weeks of work, with variable meal times and meal durations, without overtime. In this paper, we define the problem and describe a Tabu search based solution.

021103 operations researchJob shop schedulingOperations research[INFO.INFO-RO] Computer Science [cs]/Operations Research [cs.RO]Computer science05 social sciencesReal-time computing0211 other engineering and technologies02 engineering and technologyDynamic priority scheduling[INFO.INFO-RO]Computer Science [cs]/Operations Research [cs.RO]Fair-share schedulingTabu searchScheduling (computing)Variable (computer science)Nurse scheduling problemTwo-level scheduling0502 economics and business050207 economics[ INFO.INFO-RO ] Computer Science [cs]/Operations Research [cs.RO]
researchProduct

DESDEO : An Open Framework for Interactive Multiobjective Optimization

2018

We introduce a framework for interactive multiobjective optimization methods called DESDEO released under an open source license. With the framework, we want to make interactive methods easily accessible to be applied in solving real-world problems. The framework follows an object-oriented software design paradigm, where functionalities have been divided to modular, self-contained components. The framework contains implementations of some interactive methods, but also components which can be utilized to implement more interactive methods and, thus, increase the applicability of the framework. To demonstrate how the framework can be used, we consider an example problem where the pollution of…

021103 operations researchbusiness.industryComputer scienceDistributed computing0211 other engineering and technologies02 engineering and technologyModular designOpen frameworkMulti-objective optimizationmonitavoiteoptimointiOpen source licenseavoin lähdekoodioptimointiDESDEO0202 electrical engineering electronic engineering information engineeringSoftware design020201 artificial intelligence & image processingmultiobjective optimizationongelmanratkaisubusinessImplementationoptimization
researchProduct

On the Influence of Affect in EEG-Based Subject Identification

2021

Biometric signals have been extensively used for user identification and authentication due to their inherent characteristics that are unique to each person. The variation exhibited between the brain signals (EEG) of different people makes such signals especially suitable for biometric user identification. However, the characteristics of these signals are also influenced by the user’s current condition, including his/her affective state. In this paper, we analyze the significance of the affect-related component of brain signals within the subject identification context. Consistent results are obtained across three different public datasets, suggesting that the dominant component of the sign…

021110 strategic defence & security studiesAuthenticationBiometricsmedicine.diagnostic_testbusiness.industryComputer science0211 other engineering and technologiesContext (language use)Pattern recognition02 engineering and technologyElectroencephalographyHuman-Computer InteractionIdentification (information)Component (UML)0202 electrical engineering electronic engineering information engineeringTask analysismedicine020201 artificial intelligence & image processingArtificial intelligencebusinessAffective computingSoftwareIEEE Transactions on Affective Computing
researchProduct

Efficient Protection for VDI Workstations

2019

Many enterprises migrate to a private cloud VDI environment. In such an environment multiple workstations are served by a single powerful server. On such an environment each VDI workstation receives only a limited CPU power. An average of less than a quarter of a core per planned VDI workstation is a common setup. Under such cases, anti-virus and application control software load is multiplied by the number of VDI workstation running on each server. These security applications take merely a few percentages of a single core on a normal desktop. However, on a VDI server where the multiple VDI workstations run on a single server, they may consume 20-25 percent the load. Naturally, such an incr…

021110 strategic defence & security studiesCPU power dissipationWorkstationComputer sciencebusiness.industry0211 other engineering and technologiesControl softwareSingle serverCloud computing02 engineering and technologycomputer.software_genreVirtualizationlaw.inventionlawControl system0202 electrical engineering electronic engineering information engineeringOperating system020201 artificial intelligence & image processingSingle-corebusinesscomputer2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
researchProduct

Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor Networks

2018

While analyzing an explosive amount of data collected in today’s wireless sensor networks (WSNs), the redundant information in the sensed data needs to be handled. In-network data processing is a technique which can eliminate or reduce such redundancy, leading to minimized resource consumption. On the other hand, trust management techniques establish trust relationships among nodes and detect unreliable nodes. In this paper, we propose two novel in-network data processing schemes for trust management in static WSNs. The first scheme targets at networks, where sensor nodes are closely collocated to report the same event. Considering both spatial and temporal correlations, this scheme generat…

021110 strategic defence & security studiesComputer scienceNode (networking)Reliability (computer networking)Distributed computing0211 other engineering and technologies020206 networking & telecommunications02 engineering and technologyEnergy consumptionSensor node0202 electrical engineering electronic engineering information engineeringRedundancy (engineering)Trust management (information system)Electrical and Electronic EngineeringSubjective logicInstrumentationWireless sensor networkIEEE Sensors Journal
researchProduct

Two novel subjective logic-based in-network data processing schemes in wireless sensor networks

2016

Wireless sensor networks (WSNs) consist of connected low-cost and small-size sensor nodes. The sensor nodes are characterized by various limitations, such as energy availability, processing power, and storage capacity. Typically, nodes collect data from an environment and transmit the raw or processed data to a sink. However, the collected data contains often redundant information. An in-network processing scheme attempts to eliminate or reduce such redundancy in sensed data. In this paper, we propose two in-network data processing schemes for WSNs, which are built based on a lightweight algebra for data processing. The schemes bring also benefits like decreased network traffic load and inc…

021110 strategic defence & security studiesData processingbusiness.industryComputer scienceVisual sensor networkReal-time computing0211 other engineering and technologies020206 networking & telecommunications02 engineering and technologySynthetic dataKey distribution in wireless sensor networks0202 electrical engineering electronic engineering information engineeringMobile wireless sensor networkWirelessbusinessSubjective logicWireless sensor network2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct