Distributed anonymous function computation in information fusion and multiagent systems
We propose a model for deterministic distributed function computation by a network of identical and anonymous nodes, with bounded computation and storage capabilities that do not scale with the network size.
Hendrickx, Julien M. +2 more
core +3 more sources
The Future of Research in Cognitive Robotics: Foundation Models or Developmental Cognitive Models?
Research in cognitive robotics founded on principles of developmental psychology and enactive cognitive science would yield what we seek in autonomous robots: the ability to perceive its environment, learn from experience, anticipate the outcome of events, act to pursue goals, and adapt to changing circumstances without resorting to training with ...
David Vernon
wiley +1 more source
Auditory–Tactile Congruence for Synthesis of Adaptive Pain Expressions in RoboPatients
In this work, we explore auditory–tactile congruence for synthesizing adaptive vocal pain expressions in robopatients. Using a robopatient platform that integrates vocal pain sounds with palpation forces, we conducted 7680 trials across 20 participants.
Saitarun Nadipineni +4 more
wiley +1 more source
Threshold traceability anonymous authentication scheme without trusted center for ad hoc network
In order to provide anonymous authentication for ad hoc network,democratic group signatures with centerless secret sharing scheme and proposed a threshold traceability anonymous authentication scheme without trusted center for ad hoc network were ...
Fang-bin LIU +3 more
doaj +2 more sources
Secure Anonymous Conferencing in Quantum Networks
23 pages and 3 figures. The Supplemental Material is placed at the end of the manuscript. Main changes with respect to previous version: new title, Introduction section reworked, references added, section 10 added in the Supplemental ...
Federico Grasselli +6 more
openaire +3 more sources
Representing Network Trust and Using It to Improve Anonymous Communication [PDF]
Motivated by the effectiveness of correlation attacks against Tor, the censorship arms race, and observations of malicious relays in Tor, we propose that Tor users capture their trust in network elements using probability distributions over the sets of ...
Feigenbaum, Joan +3 more
core
Data‐Driven Bulldozer Blade Control for Autonomous Terrain Leveling
A simulation‐driven framework for autonomous bulldozer leveling is presented, combining high‐fidelity terramechanics simulation with a neural‐network‐based reduced‐order model. Gradient‐based optimization enables efficient, low‐level blade control that balances leveling quality and operation time.
Harry Zhang +5 more
wiley +1 more source
Anonymous Authentication Protocol Based on Certificateless Signature for Vehicular Network [PDF]
Vehicle identity is the vehicle’s exclusive user legitimate identification stored in trusted centre,which is directly related to the vehicle user’s information,so that its anonymous authentication reflects the protection of user privacy.Based on a ...
ZHANG Xinyun,XU Yan,CUI Jie
doaj +1 more source
A method for identifying Tor hosts based on machine learning techniques
Tor is an anonymous Internet communication system based on onion routing network protocol. Network traffics generated by normal applications become hard to trace when they are delivered by Tor system.
Zhang Ling +3 more
doaj +1 more source
Consensus Formation and Change are Enhanced by Neutrality
Neutral agents are shown to enhance both the formation and overturning of consensus in collective decision‐making. A general mathematical model and experiments with locusts and humans reveal that neutrality enables robust consensus via simple interactions and accelerates consensus change by reducing effective population size.
Andrei Sontag +3 more
wiley +1 more source

