Sciweavers

9405 search results - page 1771 / 1881
» Computing a Model of Set Theory
Sort
View
ICRA
2010
IEEE
148views Robotics» more  ICRA 2010»
15 years 2 months ago
Geodesic trajectory generation on learnt skill manifolds
Abstract— Humanoid robots are appealing due to their inherent dexterity. However, these potential benefits may only be realized if the corresponding motion synthesis procedure i...
Ioannis Havoutis, Subramanian Ramamoorthy
139
Voted
PAIRING
2010
Springer
116views Cryptology» more  PAIRING 2010»
15 years 2 months ago
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
Lewko and Waters [Eurocrypt 2010] presented a fully secure HIBE with short ciphertexts. In this paper we show how to modify their construction to achieve anonymity. We prove the s...
Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
PKDD
2010
Springer
128views Data Mining» more  PKDD 2010»
15 years 2 months ago
Learning to Tag from Open Vocabulary Labels
Most approaches to classifying media content assume a fixed, closed vocabulary of labels. In contrast, we advocate machine learning approaches which take advantage of the millions...
Edith Law, Burr Settles, Tom M. Mitchell
EMNLP
2010
15 years 1 months ago
Soft Syntactic Constraints for Hierarchical Phrase-Based Translation Using Latent Syntactic Distributions
In this paper, we present a novel approach to enhance hierarchical phrase-based machine translation systems with linguistically motivated syntactic features. Rather than directly ...
Zhongqiang Huang, Martin Cmejrek, Bowen Zhou
ICASSP
2009
IEEE
15 years 1 months ago
Robust joint localization and time synchronization in wireless sensor networks with bounded anchor uncertainties
A unified framework to jointly solve the two problems of localization and synchronization at the same time is presented in this paper. The joint approach is attractive because it ...
Jun Zheng, Yik-Chung Wu
« Prev « First page 1771 / 1881 Last » Next »