Sciweavers

1648 search results - page 69 / 330
» Where to Build a Door
Sort
View
CISC
2007
Springer
111views Cryptology» more  CISC 2007»
14 years 4 months ago
Multivariates Polynomials for Hashing
We propose the idea of building a secure hash using quadratic or higher degree multivariate polynomials over a finite field as the compression function. We analyze some security ...
Jintai Ding, Bo-Yin Yang
ICCS
2007
Springer
14 years 4 months ago
Reducing the Representation Complexity of Lattice-Based Taxonomies
Abstract. Representing concept lattices constructed from large contexts often results in heavy, complex diagrams that can be impractical to handle and, eventually, to make sense of...
Sergei O. Kuznetsov, Sergei A. Obiedkov, Camille R...
IROS
2006
IEEE
152views Robotics» more  IROS 2006»
14 years 3 months ago
Integrating Active Mobile Robot Object Recognition and SLAM in Natural Environments
Abstract— Linking semantic and spatial information has become an important research area in robotics since, for robots interacting with humans and performing tasks in natural env...
Staffan Ekvall, Patric Jensfelt, Danica Kragic
CIG
2005
IEEE
14 years 3 months ago
Combining Tactical Search and Monte-Carlo in the Game of Go
We present a way to integrate search and Monte-Carlo methods in the game of Go. Our program uses search to find the status of tactical goals, builds groups, selects interesting go...
Tristan Cazenave, Bernard Helmstetter
CHARME
2005
Springer
120views Hardware» more  CHARME 2005»
14 years 3 months ago
How Thorough Is Thorough Enough?
Abstraction is the key for effectively dealing with the state explosion in model-checking. Unfortunately, finding abstractions which are small and yet enable us to get conclusive ...
Arie Gurfinkel, Marsha Chechik