Sciweavers

1663 search results - page 175 / 333
» Computer Security in the Real World
Sort
View
FC
2009
Springer
84views Cryptology» more  FC 2009»
15 years 7 months ago
Private Intersection of Certified Sets
Abstract. This paper introduces certified sets to the private set intersection problem. A private set intersection protocol allows Alice and Bob to jointly compute the set intersec...
Jan Camenisch, Gregory M. Zaverucha
GECCO
2006
Springer
174views Optimization» more  GECCO 2006»
15 years 7 months ago
Optimizing of NC tool paths for five-axis milling using evolutionary algorithms on wavelets
Computer aided NC-path generation of five-axis milling using a standard CAM-system does usually not take machine dynamics and kinematics into account. This results in machine move...
Klaus Weinert, Andreas Zabel, Heinrich Müller...
146
Voted
AISB
1995
Springer
15 years 7 months ago
The Ant Colony Metaphor for Searching Continuous Design Spaces
This paper describes a form of dynamical computational system--4he ant colony---and presents an ant colony model for continuous space optimisation problems. The ant colony metapho...
George Bilchev, Ian C. Parmee
IJCAI
2007
15 years 5 months ago
Mediating between Qualitative and Quantitative Representations for Task-Orientated Human-Robot Interaction
In human-robot interaction (HRI) it is essential that the robot interprets and reacts to a human’s utterances in a manner that reflects their intended meaning. In this paper we...
Michael Brenner, Nick Hawes, John D. Kelleher, Jer...
134
Voted
IJCAI
2007
15 years 5 months ago
Collapsed Variational Dirichlet Process Mixture Models
Nonparametric Bayesian mixture models, in particular Dirichlet process (DP) mixture models, have shown great promise for density estimation and data clustering. Given the size of ...
Kenichi Kurihara, Max Welling, Yee Whye Teh