By Topic

Computational Cybernetics, 2004. ICCC 2004. Second IEEE International Conference on

Date Aug. 30 2004-Sept. 1 2004

Filter Results

Displaying Results 1 - 25 of 152
  • 2004 International Conference on Computational Cybernetics Proceedings

    Publication Year: 2004, Page(s): 0_1
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2004, Page(s): 0_2
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • 2004 International Conference on Computational Cybernetics Proceedings

    Publication Year: 2004, Page(s): 0_3
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2004, Page(s): 0_4
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • 2004 International Conference on Computational Cybernetics Proceedings

    Publication Year: 2004, Page(s): 0_5
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • Copyright page

    Publication Year: 2004, Page(s): 0_6
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2004, Page(s):0_7 - 0_8
    Request permission for commercial reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s):i - vii
    Request permission for commercial reuse | PDF file iconPDF (328 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2004, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • Welcome from the general co-chairmen

    Publication Year: 2004, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (75 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2004, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • Plenary sessions

    Publication Year: 2004, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (7 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2004, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • Composable embedded systems

    Publication Year: 2004, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (202 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2004, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • Multi-sensor, multi-source information fusion: architecture, algorithms, and applications - a panoramic overview

    Publication Year: 2004, Page(s): 5
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (179 KB) | HTML iconHTML

    This plenary presentation offers a panoramic overview of the field of multi-sensor, and/or multi-source information fusion from three complementary perspectives, namely, architectures, algorithms, and applications. This overview is developed through addressing the questions of 'what', 'why', 'when', and last but not least 'how' of information fusion and illustrating the answers with appropriate al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Publication Year: 2004, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • Biological and machine vision

    Publication Year: 2004, Page(s): 7
    Request permission for commercial reuse | PDF file iconPDF (193 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2004, Page(s): 8
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • Distributed intelligent systems: technologies and applications

    Publication Year: 2004, Page(s):9 - 10
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    This presentation provides an overview of the technologies and applications of distributed intelligent systems that have been developed by the author, his students, and his colleagues in cooperation with industry, partners of the Holonic Manufacturing Systems Consortium (http://hms.ifw.uni-hannover.de), a major international project of the Intelligent Manufacturing Systems Program (W.A. Gruver et ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorials

    Publication Year: 2004, Page(s): 11
    Request permission for commercial reuse | PDF file iconPDF (7 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2004, Page(s): 12
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • Model-based development of robotic control systems

    Publication Year: 2004, Page(s): 13
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    In the tutorial the participants learned about problems building embedded real-time control applications, model-based development, and the latest approaches to develop embedded software systems. The tutorial started with an introduction to the topic of embedded real-time systems. This comprises basic properties of real-time systems such as communication or computation and leads to the ideas of tim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Publication Year: 2004, Page(s): 14
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • Principles and challenges in network defense

    Publication Year: 2004, Page(s): 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB) | HTML iconHTML

    Summary form only given. This tutorial begins with an introduction to the basic concepts and issues of information assurance. An assortment of important topics is discuss including vulnerability analysis, computer attacks, firewalls, vulnerability scanners, intrusion detection systems, risk analysis, data protection mechanisms, and challenges in information assurance and security View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.