Sciweavers

64 search results - page 7 / 13
» Clarkson's Algorithm for Violator Spaces
Sort
View
50
Voted
ICRA
2000
IEEE
92views Robotics» more  ICRA 2000»
15 years 2 months ago
Action Module Planning and its Application to an Experimental Climbing Robot
This paper presents the application of an action module planning method to an experimental climbing robot named LIBRA. The method searches for a sequence of physically realizable ...
David M. Bevly, Shane Farritor, Steven Dubowsky
67
Voted
GLVLSI
2009
IEEE
131views VLSI» more  GLVLSI 2009»
15 years 4 months ago
Octilinear redistributive routing in bump arrays
This paper proposes a scheme for automatic re-distribution layer (RDL) routing, which is used in chip-package connections. Traditional RDL routing designs are mostly performed man...
Renshen Wang, Chung-Kuan Cheng
103
Voted
ECAI
2008
Springer
14 years 11 months ago
A Decomposition Technique for Max-CSP
The objective of the Maximal Constraint Satisfaction Problem (Max-CSP) is to find an instantiation which minimizes the number of constraint violations in a constraint network. In t...
Hachemi Bennaceur, Christophe Lecoutre, Olivier Ro...
AIEDAM
1998
87views more  AIEDAM 1998»
14 years 9 months ago
Learning to set up numerical optimizations of engineering designs
Gradient-based numerical optimization of complex engineering designs offers the promise of rapidly producing better designs. However, such methods generally assume that the object...
Mark Schwabacher, Thomas Ellman, Haym Hirsh
90
Voted
CCS
2011
ACM
13 years 9 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta