Sciweavers

158 search results - page 20 / 32
» Behavior Based Record Linkage
Sort
View
STOC
1996
ACM
185views Algorithms» more  STOC 1996»
14 years 18 days ago
Adaptively Secure Multi-Party Computation
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries i.e., adversaries that may choose the corrupted parties during the course ...
Ran Canetti, Uriel Feige, Oded Goldreich, Moni Nao...
HRI
2010
ACM
14 years 3 months ago
Perception of affect elicited by robot motion
—Nonverbal behaviors serve as a rich source of information in inter human communication. In particular, motion cues can reveal details on a person’s current physical and mental...
Martin Saerbeck, Christoph Bartneck
FM
2009
Springer
95views Formal Methods» more  FM 2009»
14 years 1 months ago
On the Complexity of Synthesizing Relaxed and Graceful Bounded-Time 2-Phase Recovery
The problem of enforcing bounded-time 2-phase recovery in real-time programs is often necessitated by conflict between faulttolerance requirements and timing constraints. In this ...
Borzoo Bonakdarpour, Sandeep S. Kulkarni
ICRA
1999
IEEE
89views Robotics» more  ICRA 1999»
14 years 22 days ago
Failure Tolerant Teleoperation of a Kinematically Redundant Manipulator: An Experimental Study
Teleoperated robots in harsh environments have a significant likelihood of failures. It has been shown in previous work that a common type of failure such as that of a joint "...
Manish Goel, Anthony A. Maciejewski, Venkataramana...
CHI
2009
ACM
13 years 11 months ago
Computer usage in daily life
In this paper we explore the use of computer at home. This work is based on the automatic recording of application focus data in natural situation from a wide representative panel...
Thomas Beauvisage