Sciweavers

6608 search results - page 1310 / 1322
» On the Completeness of Model Checking
Sort
View
TPDS
2008
116views more  TPDS 2008»
13 years 7 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
AROBOTS
2002
115views more  AROBOTS 2002»
13 years 7 months ago
Statistical Learning for Humanoid Robots
The complexity of the kinematic and dynamic structure of humanoid robots make conventional analytical approaches to control increasingly unsuitable for such systems. Learning techn...
Sethu Vijayakumar, Aaron D'Souza, Tomohiro Shibata...
BC
2004
94views more  BC 2004»
13 years 7 months ago
An adaptive neuro-fuzzy method ( ANFIS) for estimating single-trial movement-related potentials
Abstract. This study aims to recover transient, trialvarying evoked potentials (EPs), in particular the movement-related potentials (MRPs), embedded within the background cerebral ...
D. D. Ben Dayan Rubin, G. Baselli, Gideon F. Inbar...
CCE
2004
13 years 7 months ago
Improving convergence of the stochastic decomposition algorithm by using an efficient sampling technique
This work focuses on the basic stochastic decomposition (SD) algorithm of Higle and Sen [J.L. Higle, S. Sen, Stochastic Decomposition, Kluwer Academic Publishers, 1996] for two-st...
José María Ponce-Ortega, Vicente Ric...
CORR
2004
Springer
119views Education» more  CORR 2004»
13 years 7 months ago
Exploring networks with traceroute-like probes: theory and simulations
Mapping the Internet generally consists in sampling the network from a limited set of sources by using traceroute-like probes. This methodology, akin to the merging of different s...
Luca Dall'Asta, J. Ignacio Alvarez-Hamelin, Alain ...
« Prev « First page 1310 / 1322 Last » Next »