Sciweavers

3602 search results - page 142 / 721
» Isn't It About Time
Sort
View
FDTC
2008
Springer
87views Cryptology» more  FDTC 2008»
14 years 1 days ago
Silicon-level Solutions to Counteract Passive and Active Attacks
This article presents a family of cryptographic ASICs, called SecMat, designed in CMOS 130 nanometer technology by the authors with the help of STMicroelectronics. The purpose of ...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
AIIDE
2006
13 years 11 months ago
Believable and Reactive Crowds in Next Generation Games
The creation of life-like believable characters is emerging as the central focus of next-generation game development and is viewed as critical to obtaining true mass-market appeal...
Paul Kruszewski
IJCAI
2003
13 years 11 months ago
DP-SLAM: Fast, Robust Simultaneous Localization and Mapping Without Predetermined Landmarks
We present a novel, laser range finder based algorithm for simultaneous localization and mapping (SLAM) for mobile robots. SLAM addresses the problem of constructing an accurate ...
Austin I. Eliazar, Ronald Parr
AAAI
1996
13 years 11 months ago
A Connectionist Framework for Reasoning: Reasoning with Examples
We present a connectionist architecture that supports almost instantaneous deductive and abductive reasoning. The deduction algorithm responds in few steps for single rule queries...
Dan Roth
EACL
1993
ACL Anthology
13 years 11 months ago
A Tradeoff between Compositionality and Complexity in the Semantics of Dimensional Adjectives
Linguistic access to uncertain quantitative knowledge about physical properties is provided by dimensional adjectives, e.g. long-short in the spatial and temporal senses, near-far...
Geoffrey Simmons