Sciweavers

2938 search results - page 496 / 588
» On obfuscating point functions
Sort
View
ICRA
2003
IEEE
184views Robotics» more  ICRA 2003»
14 years 3 months ago
Trajectory planning for smooth transition of a biped robot
- This paper presents a third-order spline interpolation based trajectory planning method which is aiming to achieve smooth biped swing leg trajectory by reducing the instant veloc...
Zhe Tang, Changjiu Zhou, Zengqi Sun
GECCO
2010
Springer
187views Optimization» more  GECCO 2010»
14 years 3 months ago
The maximum hypervolume set yields near-optimal approximation
In order to allow a comparison of (otherwise incomparable) sets, many evolutionary multiobjective optimizers use indicator functions to guide the search and to evaluate the perfor...
Karl Bringmann, Tobias Friedrich
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
14 years 2 months ago
Zero-Knowledge Proofs with Witness Elimination
Abstract. Zero-knowledge proofs with witness elimination are protocols that enable a prover to demonstrate knowledge of a witness to the verifier that accepts the interaction prov...
Aggelos Kiayias, Hong-Sheng Zhou
FOCS
2000
IEEE
14 years 2 months ago
Stable Distributions, Pseudorandom Generators, Embeddings and Data Stream Computation
In this article, we show several results obtained by combining the use of stable distributions with pseudorandom generators for bounded space. In particular: —We show that, for a...
Piotr Indyk
INFOCOM
2000
IEEE
14 years 2 months ago
On Service Models for Multicast Transmission in Heterogeneous Environments
– We examine in this paper the tradeoff between application complexity, network complexity, and network efficiency. We argue that the design of the current Internet reflects a ...
Matthias Grossglauser, Jean-Chrysostome Bolot