Sciweavers

2714 search results - page 107 / 543
» Under the table interaction
Sort
View
JOC
1998
162views more  JOC 1998»
13 years 9 months ago
A Software-Optimized Encryption Algorithm
We describe a software-e cient encryption algorithm named SEAL 3.0. Computational cost on a modern 32-bit processor is about 4 clock cycles per byte of text. The cipher is a pseudo...
Phillip Rogaway, Don Coppersmith
TCOM
2010
67views more  TCOM 2010»
13 years 8 months ago
Weakly-Constrained Codes for Suppression of Patterning Effects in Digital Communications
—We propose weakly-constrained stream and block codes with tunable pattern-dependent statistics and demonstrate that the block code capacity at large block sizes is close to the ...
Alexander V. Shafarenko, Anton Skidin, Sergei K. T...
ICMLA
2010
13 years 8 months ago
Heuristic Method for Discriminative Structure Learning of Markov Logic Networks
Markov Logic Networks (MLNs) combine Markov Networks and first-order logic by attaching weights to firstorder formulas and viewing them as templates for features of Markov Networks...
Quang-Thang Dinh, Matthieu Exbrayat, Christel Vrai...
ICRA
2010
IEEE
131views Robotics» more  ICRA 2010»
13 years 8 months ago
Synchronizing the motion of a quadrocopter to music
This paper presents a quadrocopter flying in rhythm to music. The quadrocopter performs a periodic sideto-side motion in time to a musical beat. Underlying controllers are designed...
Angela Schöllig, Federico Augugliaro, Sergei ...
TCAD
2010
103views more  TCAD 2010»
13 years 4 months ago
Supervised Learning Based Power Management for Multicore Processors
- This paper presents a supervised learning based power management framework for a multi-processor system, where a power manager (PM) learns to predict the system performance state...
Hwisung Jung, Massoud Pedram