{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T04:51:02Z","timestamp":1743828662231,"version":"3.33.0"},"reference-count":22,"publisher":"Wiley","issue":"3","license":[{"start":{"date-parts":[[2007,3,22]],"date-time":"2007-03-22T00:00:00Z","timestamp":1174521600000},"content-version":"vor","delay-in-days":6138,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Robotic Syst."],"published-print":{"date-parts":[[1990,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This article proposes a behavioral control formalism to explain situations often encountered in complex sensor\/data fusion (eventually decentralized) information acquisition, command and control systems, it involves making the input\u2010output relations of each actor involved in the fusion process conditional on selected behavioral classes, with error creation and repair options. For each behavioral class, the input\u2010output relations are modified by concurrent behavioral rules, while the class itself has visible and hidden attributes. A formalism is also given for interactions between actors. This approach allows to describe and analyze such situations as: indirect observations, ambiguous controls, hysterisis, deadlocks, initiation of attention mechanisms. Finally, the engineering use of this approach is illustrated by three concrete designs involving humans operating indoors.<\/jats:p>","DOI":"10.1002\/rob.4620070303","type":"journal-article","created":{"date-parts":[[2007,7,6]],"date-time":"2007-07-06T09:48:58Z","timestamp":1183715338000},"page":"295-308","source":"Crossref","is-referenced-by-count":12,"title":["Behavioral knowledge in sensor\/data fusion systems"],"prefix":"10.1002","volume":"7","author":[{"given":"L. F.","family":"Pau","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2007,3,22]]},"reference":[{"key":"e_1_2_1_2_2","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5891.001.0001","volume-title":"Representation and Reality","author":"Putnam H.","year":"1988"},{"key":"e_1_2_1_3_2","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/2927.001.0001","volume-title":"Explaining Behavior","author":"Dretske F.","year":"1988"},{"key":"e_1_2_1_4_2","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4516.001.0001","volume-title":"Meaning and Mental Representation","author":"Cummins R.","year":"1989"},{"volume-title":"The Architecture of Cognition","year":"1983","author":"Anderson J. R.","key":"e_1_2_1_5_2"},{"key":"e_1_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1017\/S0140525X00023554"},{"volume-title":"Failure Diagnosis and Performance Monitoring","year":"1981","author":"Pau L. F.","key":"e_1_2_1_7_2"},{"key":"e_1_2_1_8_2","unstructured":"A. E. R.Woodcock P.Langendorf andL.Cobb \u201cPerceptual Hysterisis \u201dSignal 51\u201357(1988)."},{"key":"e_1_2_1_9_2","doi-asserted-by":"crossref","unstructured":"N.Magnemat\u2010ThalmannandD.Thalmann \u201cSynthetic actors \u201dThe Computer Bulletin (BCS) 12\u201314(1989).","DOI":"10.1007\/978-3-642-75453-1"},{"volume-title":"Communication Failure in Dialogue and Discourse: Detection and Repair Processes","year":"1987","author":"Relly R. G.","key":"e_1_2_1_10_2"},{"key":"e_1_2_1_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-83091-4"},{"key":"e_1_2_1_12_2","unstructured":"B. D.d'Ambrosio Qualitative Process Theory Using Linguistic Variables Ph.D. thesis Univ. California Berkeley 1986."},{"key":"e_1_2_1_13_2","unstructured":"L. S.Lefkowitz Knowledge Acquisition through Anticipation of Modifications Ph.D. thesis Univ. of Massachusetts 1987."},{"key":"e_1_2_1_14_2","unstructured":"IEEE Computer J. 1989 22 Special issue on autonomous intelligent machiners"},{"volume-title":"Benefits and Risks of Knowledge Based Systems","year":"1988","author":"Boden M.","key":"e_1_2_1_15_2"},{"key":"e_1_2_1_16_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0394.1986.tb00199.x"},{"key":"e_1_2_1_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8655(84)90009-6"},{"key":"e_1_2_1_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF00348718"},{"key":"e_1_2_1_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(89)90073-3"},{"key":"e_1_2_1_20_2","doi-asserted-by":"crossref","unstructured":"J.Barhen S.Gulati andM.Zak \u201cNeural learning of constrained nonlinear transformations \u201d in Ref. 13 pp.67\u201376.","DOI":"10.1109\/2.30722"},{"key":"e_1_2_1_21_2","unstructured":"V. C.ChenandY. H.Pao Learning control with neural networks inProc. 1988 IEEE Int. Conference on Robotics and Automation Scottsdale 14\u201319 May1988."},{"key":"e_1_2_1_22_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001487000126"},{"volume-title":"Economics and the Competitive Process","year":"1979","author":"Case J.","key":"e_1_2_1_23_2"}],"container-title":["Journal of Robotic Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Frob.4620070303","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/rob.4620070303","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T07:16:38Z","timestamp":1737184598000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/rob.4620070303"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990,6]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1990,6]]}},"alternative-id":["10.1002\/rob.4620070303"],"URL":"https:\/\/doi.org\/10.1002\/rob.4620070303","archive":["Portico"],"relation":{},"ISSN":["0741-2223","1097-4563"],"issn-type":[{"type":"print","value":"0741-2223"},{"type":"electronic","value":"1097-4563"}],"subject":[],"published":{"date-parts":[[1990,6]]}}}