Sciweavers

1380 search results - page 235 / 276
» Computing the optimal strategy to commit to
Sort
View
DAC
1999
ACM
14 years 9 months ago
Memory Exploration for Low Power, Embedded Systems
In embedded system design, the designer has to choose an onchip memory configuration that is suitable for a specific application. To aid in this design choice, we present a memory...
Wen-Tsong Shiue, Chaitali Chakrabarti
ICML
2008
IEEE
14 years 9 months ago
Training SVM with indefinite kernels
Similarity matrices generated from many applications may not be positive semidefinite, and hence can't fit into the kernel machine framework. In this paper, we study the prob...
Jianhui Chen, Jieping Ye
MOBIHOC
2009
ACM
14 years 8 months ago
Efficient uncoordinated FHSS anti-jamming communication
We address the problem of jamming-resistant communication in scenarios in which the communicating parties do not share secret keys. This includes scenarios where the communicating...
Mario Strasser, Christina Pöpper, Srdjan Capk...
ALT
2005
Springer
14 years 5 months ago
Defensive Universal Learning with Experts
This paper shows how universal learning can be achieved with expert advice. To this aim, we specify an experts algorithm with the following characteristics: (a) it uses only feedba...
Jan Poland, Marcus Hutter
ICRA
2009
IEEE
102views Robotics» more  ICRA 2009»
14 years 2 months ago
Safe fall: Humanoid robot fall direction change through intelligent stepping and inertia shaping
—Although fall is a rare event in the life of a humanoid robot, we must be prepared for it because its consequences are serious. In this paper we present a fall strategy which ra...
Seung-kook Yun, Ambarish Goswami, Yoshiaki Sakagam...