Sciweavers

2938 search results - page 579 / 588
» On obfuscating point functions
Sort
View
JSAC
2010
138views more  JSAC 2010»
13 years 6 months ago
Dynamic conjectures in random access networks using bio-inspired learning
—Inspired by the biological entities’ ability to achieve reciprocity in the course of evolution, this paper considers a conjecture-based distributed learning approach that enab...
Yi Su, Mihaela van der Schaar
RV
2010
Springer
127views Hardware» more  RV 2010»
13 years 6 months ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone
SIAMIS
2010
176views more  SIAMIS 2010»
13 years 6 months ago
Optimized Conformal Surface Registration with Shape-based Landmark Matching
Surface registration, which transforms different sets of surface data into one common reference space, is an important process which allows us to compare or integrate the surface ...
Lok Ming Lui, Sheshadri R. Thiruvenkadam, Yalin Wa...
CORR
2010
Springer
168views Education» more  CORR 2010»
13 years 6 months ago
Gaussian Process Structural Equation Models with Latent Variables
In a variety of disciplines such as social sciences, psychology, medicine and economics, the recorded data are considered to be noisy measurements of latent variables connected by...
Ricardo Silva
ICRA
2010
IEEE
143views Robotics» more  ICRA 2010»
13 years 5 months ago
On the influence of ship motion prediction accuracy on motion planning and control of robotic manipulators on seaborne platforms
Robotic manipulators on non-inertial platforms, such as ships, have to endure large inertial forces due to the non-inertial motion of the platform. When the non-inertial platform&#...
Pål Johan From, Jan Tommy Gravdahl, Pieter A...