Sciweavers

276 search results - page 41 / 56
» Constraint Propagation as a Proof System
Sort
View
CORR
2011
Springer
171views Education» more  CORR 2011»
13 years 2 months ago
Design, Implementation and Characterization of a Cooperative Communications System
Cooperative communications is a class of techniques which seek to improve reliability and throughput in wireless systems by pooling the resources of distributed nodes. While coope...
Patrick Murphy, Ashutosh Sabharwal
SIGGRAPH
1999
ACM
13 years 12 months ago
A Hierarchical Approach to Interactive Motion Editing for Human-Like Figures
This paper presents a technique for adapting existing motion of a human-like character to have the desired features that are specified by a set of constraints. This problem can b...
Jehee Lee, Sung Yong Shin
EUROCRYPT
2010
Springer
14 years 14 days ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
AUTOMATICA
2007
70views more  AUTOMATICA 2007»
13 years 7 months ago
Squaring the circle: An algorithm for generating polyhedral invariant sets from ellipsoidal ones
This paper presents a new (geometrical) approach to the computation of polyhedral (robustly) positively invariant (PI) sets for general (possibly discontinuous) nonlinear discrete...
A. Alessio, Mircea Lazar, Alberto Bemporad, W. P. ...
GLOBECOM
2006
IEEE
14 years 1 months ago
Distributed Bayesian Fault diagnosis in Collaborative Wireless Sensor Networks
Abstract— In this contribution, we propose an efficient collaborative strategy for online change detection, in a distributed sensor network. The collaborative strategy ensures t...
Hichem Snoussi, Cédric Richard