Sciweavers

945 search results - page 143 / 189
» Evolving Symbolic Controllers
Sort
View
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 3 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
ICRA
2003
IEEE
196views Robotics» more  ICRA 2003»
15 years 3 months ago
Generating whole body motions for a biped humanoid robot from captured human dances
— The goal of this study is a system for a robot to imitate human dances. This paper describes the process to generate whole body motions which can be performed by an actual bipe...
Shinichiro Nakaoka, Atsushi Nakazawa, Kazuhito Yok...
PLDI
2003
ACM
15 years 3 months ago
Static array storage optimization in MATLAB
An adaptation of the classic register allocation algorithm to the problem of array storage optimization in MATLAB is presented. The method involves the decomposition of an interfe...
Pramod G. Joisha, Prithviraj Banerjee
GECCO
2009
Springer
152views Optimization» more  GECCO 2009»
15 years 2 months ago
A data-based coding of candidate strings in the closest string problem
Given a set of strings S of equal lengths over an alphabet Σ, the closest string problem seeks a string over Σ whose maximum Hamming distance to any of the given strings is as s...
Bryant A. Julstrom
CAV
2000
Springer
97views Hardware» more  CAV 2000»
15 years 2 months ago
Detecting Errors Before Reaching Them
Abstract. Any formalmethodor tool is almostcertainlymoreoftenapplied in situationswheretheoutcomeis failure(acounterexample)rather than success (a correctness proof). We present a ...
Luca de Alfaro, Thomas A. Henzinger, Freddy Y. C. ...