Sciweavers

1068 search results - page 113 / 214
» Extremely randomized trees
Sort
View
ICRA
2009
IEEE
169views Robotics» more  ICRA 2009»
14 years 4 months ago
Manipulation planning with Workspace Goal Regions
— We present an approach to path planning for manipulators that uses Workspace Goal Regions (WGRs) to specify goal end-effector poses. Instead of specifying a discrete set of goa...
Dmitry Berenson, Siddhartha S. Srinivasa, Dave Fer...
CJ
2011
13 years 1 months ago
Dynamic Multipath Allocation in Ad Hoc Networks
Ad Hoc networks are characterized by fast dynamic changes in the topology of the network. A known technique to improve QoS is to use Multipath routing where packets (voice/video/...
Yosi Ben-Asher, Sharoni Feldman, Moran Feldman
FC
2005
Springer
87views Cryptology» more  FC 2005»
14 years 3 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
ASIACRYPT
2006
Springer
14 years 1 months ago
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
Understanding what construction strategy has a chance to be a good hash function is extremely important nowadays. In TCC'04, Maurer et al. [13] introduced the notion of indiff...
Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yu...
CSB
2004
IEEE
113views Bioinformatics» more  CSB 2004»
14 years 1 months ago
Shannon Information in Complete Genomes
Shannon information in the genomes of all completely sequenced prokaryotes and eukaryotes are measured in word lengths of two to ten letters. It is found that in a scale-dependent...
Chang-Heng Chang, Li-Ching Hsieh, Ta-Yuan Chen, Ho...