Sciweavers

909 search results - page 157 / 182
» Games for extracting randomness
Sort
View
CVPR
2009
IEEE
15 years 2 months ago
D - Clutter: Building object model library from unsupervised segmentation of cluttered scenes
Autonomous systems which learn and utilize a limited visual vocabulary have wide spread applications. Enabling such systems to segment a set of cluttered scenes into objects is ...
Chandra Kambhamettu, Dimitris N. Metaxas, Gowri So...
ICRA
2010
IEEE
213views Robotics» more  ICRA 2010»
13 years 7 months ago
A switching control law for a networked visual servo control system
— In this paper, a novel switching controller is proposed for a networked visual servo control system with varying feedback delay due to image processing and data transmission. T...
Haiyan Wu, Chih-Chung Chen, Jiayun Feng, Kolja K&u...
JNS
2010
61views more  JNS 2010»
13 years 6 months ago
Validity and Failure of the Boltzmann Approximation of Kinetic Annihilation
This paper introduces a new method to show the validity of a continuum description for the deterministic dynamics of many interacting particles. Here the many particle evolution is...
Karsten Matthies, Florian Theil
PVLDB
2010
120views more  PVLDB 2010»
13 years 6 months ago
Sampling the Repairs of Functional Dependency Violations under Hard Constraints
Violations of functional dependencies (FDs) are common in practice, often arising in the context of data integration or Web data extraction. Resolving these violations is known to...
George Beskales, Ihab F. Ilyas, Lukasz Golab
SCN
2010
Springer
145views Communications» more  SCN 2010»
13 years 6 months ago
Distributed Private-Key Generators for Identity-Based Cryptography
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
Aniket Kate, Ian Goldberg