Sciweavers

57 search results - page 8 / 12
» Independence and Functional Dependence Relations on Secrets
Sort
View
ICRA
2006
IEEE
134views Robotics» more  ICRA 2006»
14 years 2 months ago
Validation and Explanation of Waterhammer-based Locomotion
ACT Search and rescue robots often use tethers to provide power and communication, but tethers get caught on debris and small robots have difficulty with the added drag of the tet...
Ross L. Feller, Douglas P. Perrin, Robert D. Howe
BSL
2000
153views more  BSL 2000»
13 years 8 months ago
Combinatorics with definable sets: Euler characteristics and Grothendieck rings
We recall the notions of weak and strong Euler characteristics on a first order structure and make explicit the notion of a Grothendieck ring of a structure. We define partially or...
Jan Krajícek, Thomas Scanlon
CCS
2004
ACM
14 years 1 months ago
Privacy and security in library RFID: issues, practices, and architectures
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries ...
David Molnar, David Wagner
PROMISE
2010
13 years 3 months ago
Modeling the relationship between software effort and size using deming regression
Background: The relation between software effort and size has been modeled in literature as exponential, in the sense that the natural logarithm of effort is expressed as a linear...
Nikolaos Mittas, Makrina Viola Kosti, Vasiliki Arg...
IJON
2007
88views more  IJON 2007»
13 years 8 months ago
Information maximization in face processing
This perspective paper explores principles of unsupervised learning and how they relate to face recognition. Dependency coding and information maximization appear to be central pr...
Marian Stewart Bartlett