Sciweavers

1995 search results - page 365 / 399
» What's the Problem
Sort
View
109
Voted
CEEMAS
2005
Springer
15 years 9 months ago
How Our Beliefs Contribute to Interpret Actions
Abstract. In update logic the interpretation of an action is often assumed to be independent from the agents’ beliefs about the situation (see [BMS04] or [Auc05]). In this paper ...
Guillaume Aucher
136
Voted
CRYPTO
2005
Springer
125views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
Secure Computation Without Authentication
In the setting of secure multiparty computation, a set of parties wish to jointly compute some function of their inputs. Such a computation must preserve certain security propertie...
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pa...
120
Voted
GFKL
2005
Springer
142views Data Mining» more  GFKL 2005»
15 years 9 months ago
Near Similarity Search and Plagiarism Analysis
Abstract. Existing methods to text plagiarism analysis mainly base on “chunking”, a process of grouping a text into meaningful units each of which gets encoded by an integer nu...
Benno Stein, Sven Meyer zu Eissen
123
Voted
ISRR
2005
Springer
138views Robotics» more  ISRR 2005»
15 years 9 months ago
One Is Enough!
We postulate that multi-wheel statically-stable mobile robots for operation in human environments are an evolutionarydead end. Robots of this class tall enough to interact meaning...
Tom Lauwers, George Kantor, Ralph L. Hollis
140
Voted
ISRR
2005
Springer
154views Robotics» more  ISRR 2005»
15 years 9 months ago
Session Overview Planning
ys when planning meant searching for a sequence of abstract actions that satisfied some symbolic predicate. Robots can now learn their own representations through statistical infe...
Nicholas Roy, Roland Siegwart