Sciweavers

988 search results - page 131 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
ICRA
2003
IEEE
154views Robotics» more  ICRA 2003»
14 years 2 months ago
Automated multisensor polyhedral model acquisition
Abstract—We describe a method for automatically generating accurate piecewise planar models of indoor scenes using a combination of a 2D laser scanner and a camera on a mobile pl...
Diego Ortin, J. M. M. Montiel, Andrew Zisserman
ACG
2003
Springer
14 years 2 months ago
Searching with Analysis of Dependencies in a Solitaire Card Game
We present a new method for taking advantage of the relative independence between parts of a single-player game. We describe an implementation for improving the search in a solitai...
Bernard Helmstetter, Tristan Cazenave
TCC
2010
Springer
170views Cryptology» more  TCC 2010»
14 years 27 days ago
On Related-Secret Pseudorandomness
Related-key attacks are attacks against constructions which use a secret key (such as a blockcipher) in which an attacker attempts to exploit known or chosen relationships among ke...
David Goldenberg, Moses Liskov
3DPVT
2004
IEEE
119views Visualization» more  3DPVT 2004»
14 years 22 days ago
Frequency Domain Registration of Computer Tomography Data
This paper presents a new method for registering computer tomography (CT) volumetric data of human bone structures relative to observations made at different times. The system we ...
Marco Andreetto, Guido Maria Cortelazzo, Luca Lucc...
AAAI
2008
13 years 11 months ago
Partially Synchronized DEC-MDPs in Dynamic Mechanism Design
In this paper, we combine for the first time the methods of dynamic mechanism design with techniques from decentralized decision making under uncertainty. Consider a multi-agent s...
Sven Seuken, Ruggiero Cavallo, David C. Parkes