Sciweavers

575 search results - page 48 / 115
» A Note on Karr's Algorithm
Sort
View
DMKD
2003
ACM
148views Data Mining» more  DMKD 2003»
15 years 4 months ago
A symbolic representation of time series, with implications for streaming algorithms
The parallel explosions of interest in streaming data, and data mining of time series have had surprisingly little intersection. This is in spite of the fact that time series data...
Jessica Lin, Eamonn J. Keogh, Stefano Lonardi, Bil...
ATAL
2008
Springer
15 years 1 months ago
Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games
In a class of games known as Stackelberg games, one agent (the leader) must commit to a strategy that can be observed by the other agent (the follower or adversary) before the adv...
Praveen Paruchuri, Jonathan P. Pearce, Janusz Mare...
JIRS
2007
162views more  JIRS 2007»
14 years 11 months ago
Walking Control Algorithm of Biped Humanoid Robot on Uneven and Inclined Floor
This paper describes walking control algorithm for the stable walking of a biped humanoid robot on an uneven and inclined floor. Many walking control techniques have been develope...
Jung-Yup Kim, Ill-Woo Park, Jun-Ho Oh
CPM
2000
Springer
160views Combinatorics» more  CPM 2000»
15 years 3 months ago
Approximation Algorithms for Hamming Clustering Problems
We study Hamming versions of two classical clustering problems. The Hamming radius p-clustering problem (HRC) for a set S of k binary strings, each of length n, is to find p bina...
Leszek Gasieniec, Jesper Jansson, Andrzej Lingas
FSE
2004
Springer
125views Cryptology» more  FSE 2004»
15 years 2 months ago
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
ded abstract of this paper appears in Fast Software Encryption, FSE 2004, Lecture Notes in Computer Science, W. Meier and B. Roy editors, Springer-Verlag, 2004. This is the full ve...
Tetsu Iwata, Tadayoshi Kohno