Sciweavers

1061 search results - page 147 / 213
» A general definition of malware
Sort
View
COMPGEOM
1987
ACM
15 years 3 months ago
Simplified Voronoi Diagrams
We are interested in Voronoi diagrams as a tool in robot path planning, where the search for a path in an r-dimensional space may be simplified to a search on an (r- l)-dimensional...
John F. Canny, Bruce Randall Donald
APPROX
2008
Springer
90views Algorithms» more  APPROX 2008»
15 years 1 months ago
Tensor Products of Weakly Smooth Codes Are Robust
: We continue the study of robustly testable tensor codes and expand the class of base codes that can be used as a starting point for the construction of locally testable codes via...
Eli Ben-Sasson, Michael Viderman
APPROX
2008
Springer
127views Algorithms» more  APPROX 2008»
15 years 1 months ago
Approximating Single Machine Scheduling with Scenarios
In the field of robust optimization, the goal is to provide solutions to combinatorial problems that hedge against variations of the numerical parameters. This constitutes an effor...
Monaldo Mastrolilli, Nikolaus Mutsanas, Ola Svenss...
ASWC
2008
Springer
15 years 1 months ago
Bounded Ontological Consistency for Scalable Dynamic Knowledge Infrastructures
Both semantic web applications and individuals are in need of knowledge infrastructures that can be used in dynamic and distributed environments where different autonomous entities...
Maciej Zurawski, Alan Smaill, Dave Robertson
ATAL
2008
Springer
15 years 1 months ago
Distinctiveness in multimodal behaviors
While talking, people may move heavily their arms around, remain expressionless, or even display subtle facial movements... These differences may arise from personality, cultural,...
Maurizio Mancini, Catherine Pelachaud