Sciweavers

1583 search results - page 231 / 317
» Using perceptual grouping for object group selection
Sort
View
ICRA
2009
IEEE
106views Robotics» more  ICRA 2009»
14 years 4 months ago
Stochastic strategies for a swarm robotic assembly system
— We present a decentralized, scalable approach to assembling a group of heterogeneous parts into different products using a swarm of robots. While the assembly plans are predete...
Loic Matthey, Spring Berman, Vijay Kumar
ICPR
2008
IEEE
14 years 3 months ago
Assembly of puzzles by connecting between blocks
In this paper, we proposed a method for solving the rectangle piece jigsaw puzzle assembly problem. A shape of a piece is a rectangle, and a puzzle image is RGB full color. The as...
Takenori Murakami, Fubito Toyama, Kenji Shoji, Jui...
ACSAC
2005
IEEE
14 years 2 months ago
Paranoid: A Global Secure File Access Control System
The Paranoid file system is an encrypted, secure, global file system with user managed access control. The system provides efficient peer-to-peer application transparent file ...
Fareed Zaffar, Gershon Kedem, Ashish Gehani
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
14 years 2 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani
DEXA
2004
Springer
140views Database» more  DEXA 2004»
14 years 2 months ago
Extracting User Behavior by Web Communities Technology on Global Web Logs
A lot of work has been done on extracting the model of web user behavior. Most of them target server-side logs that cannot track user behavior outside of the server. Recently, a no...
Shingo Otsuka, Masashi Toyoda, Jun Hirai, Masaru K...