Sciweavers

603 search results - page 69 / 121
» A General Approximation Technique for Constrained Forest Pro...
Sort
View
WS
2006
ACM
15 years 5 months ago
Location privacy in wireless personal area networks
Location privacy is one of the major security problems in a Wireless Personal Area Network (WPAN). By eavesdropping on the transmitted packets, an attacker can keep track of the p...
Dave Singelée, Bart Preneel
IROS
2007
IEEE
123views Robotics» more  IROS 2007»
15 years 6 months ago
Reinforcement learning in multi-dimensional state-action space using random rectangular coarse coding and Gibbs sampling
: This paper presents a coarse coding technique and an action selection scheme for reinforcement learning (RL) in multi-dimensional and continuous state-action spaces following con...
Kimura Kimura
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
16 years 6 hour ago
Fast range-summable random variables for efficient aggregate estimation
Exact computation for aggregate queries usually requires large amounts of memory ? constrained in data-streaming ? or communication ? constrained in distributed computation ? and ...
Florin Rusu, Alin Dobra
ICASSP
2011
IEEE
14 years 3 months ago
Distributed beamforming for multiuser peer-to-peer and multi-group multicasting relay networks
We generalize the concept of multiuser peer-to-peer (MUP2P) relay networks to that of a multi-group multicasting (MGM) relay network where each source may broadcast its message to...
Nils Bornhorst, Marius Pesavento, Alex B. Gershman
ATAL
2005
Springer
15 years 5 months ago
Coordinating multiple rovers with interdependent science objectives
This paper describes an integrated system for coordinating multiple rover behavior with the overall goal of collecting planetary surface data. The MISUS system combines techniques...
Tara A. Estlin, Daniel M. Gaines, Forest Fisher, R...