Sciweavers

95 search results - page 13 / 19
» Policy Gradients for Cryptanalysis
Sort
View
ICRA
2002
IEEE
176views Robotics» more  ICRA 2002»
14 years 17 days ago
Coverage Control for Mobile Sensing Networks
— This paper describes decentralized control laws for the coordination of multiple vehicles performing spatially distributed tasks. The control laws are based on a gradient desce...
Jorge Cortés, Sonia Martínez, Timur ...
GLOBECOM
2009
IEEE
13 years 11 months ago
Stochastic Resource Allocation over Fading Multiple Access and Broadcast Channels
In this paper, we consider the optimal rate and power allocation that maximizes a general utility function of average user rates in a fading multiple-access or broadcast channel. B...
Na Gao, Xin Wang
ICAC
2008
IEEE
14 years 2 months ago
Generating Adaptation Policies for Multi-tier Applications in Consolidated Server Environments
Creating good adaptation policies is critical to building complex autonomic systems since it is such policies that define the system configuration used in any given situation. W...
Gueyoung Jung, Kaustubh R. Joshi, Matti A. Hiltune...
NIPS
2008
13 years 9 months ago
Policy Search for Motor Primitives in Robotics
Many motor skills in humanoid robotics can be learned using parametrized motor primitives as done in imitation learning. However, most interesting motor learning problems are high...
Jens Kober, Jan Peters
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
13 years 11 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui