Sciweavers

2714 search results - page 107 / 543
» Under the table interaction
Sort
View
105
Voted
JOC
1998
162views more  JOC 1998»
15 years 3 months ago
A Software-Optimized Encryption Algorithm
We describe a software-e cient encryption algorithm named SEAL 3.0. Computational cost on a modern 32-bit processor is about 4 clock cycles per byte of text. The cipher is a pseudo...
Phillip Rogaway, Don Coppersmith
114
Voted
TCOM
2010
67views more  TCOM 2010»
15 years 1 months ago
Weakly-Constrained Codes for Suppression of Patterning Effects in Digital Communications
—We propose weakly-constrained stream and block codes with tunable pattern-dependent statistics and demonstrate that the block code capacity at large block sizes is close to the ...
Alexander V. Shafarenko, Anton Skidin, Sergei K. T...
162
Voted
ICMLA
2010
15 years 1 months ago
Heuristic Method for Discriminative Structure Learning of Markov Logic Networks
Markov Logic Networks (MLNs) combine Markov Networks and first-order logic by attaching weights to firstorder formulas and viewing them as templates for features of Markov Networks...
Quang-Thang Dinh, Matthieu Exbrayat, Christel Vrai...
104
Voted
ICRA
2010
IEEE
131views Robotics» more  ICRA 2010»
15 years 1 months ago
Synchronizing the motion of a quadrocopter to music
This paper presents a quadrocopter flying in rhythm to music. The quadrocopter performs a periodic sideto-side motion in time to a musical beat. Underlying controllers are designed...
Angela Schöllig, Federico Augugliaro, Sergei ...
139
Voted
TCAD
2010
103views more  TCAD 2010»
14 years 10 months ago
Supervised Learning Based Power Management for Multicore Processors
- This paper presents a supervised learning based power management framework for a multi-processor system, where a power manager (PM) learns to predict the system performance state...
Hwisung Jung, Massoud Pedram