Sciweavers

516 search results - page 62 / 104
» Sets of k-Independent Strings
Sort
View
HYBRID
2009
Springer
14 years 3 months ago
Optimization of Multi-agent Motion Programs with Applications to Robotic Marionettes
Abstract. In this paper, we consider the problem of generating optimized, executable control code from high-level, symbolic specifications. In particular, we construct symbolic co...
Patrick Martin, Magnus Egerstedt
ICVS
2009
Springer
14 years 3 months ago
Saliency-Based Obstacle Detection and Ground-Plane Estimation for Off-Road Vehicles
Abstract. Due to stringing time constraints, saliency models are becoming popular tools for building situated robotic systems requiring, for instance, object recognition and vision...
Pedro Santana, Magno Guedes, Luís Correia, ...
ICPR
2008
IEEE
14 years 3 months ago
Pose sentences: A new representation for action recognition using sequence of pose words
We propose a method for recognizing human actions in videos. Inspired from the recent bag-of-words approaches, we represent actions as documents consisting of words, where a word ...
Kardelen Hatun, Pinar Duygulu
LCN
2008
IEEE
14 years 3 months ago
P2P directory search: Signature Array Hash Table
— Bloom filters are a well known data structure for approximate set membership. Bloom filters are space efficient but require many independent hashes and consecutive memory acces...
Miguel Jimeno, Kenneth J. Christensen
FSE
2007
Springer
104views Cryptology» more  FSE 2007»
14 years 2 months ago
How to Enrich the Message Space of a Cipher
Abstract. Given (deterministic) ciphers E and E that can encipher messages of l and n bits, respectively, we construct a cipher E∗ = XLS[E, E] that can encipher messages of l + s...
Thomas Ristenpart, Phillip Rogaway