Sciweavers

3502 search results - page 686 / 701
» From Machine Learning to Machine Reasoning
Sort
View
FOCS
2007
IEEE
15 years 6 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak
ECTEL
2007
Springer
15 years 5 months ago
Reflections on Digital Literacy
Parallel to the societal diffusion of digital technologies, the debate on their impacts and requirements has created terms like ICT literacy, digital literacy or digital competenc...
Harald Gapski
IROS
2006
IEEE
144views Robotics» more  IROS 2006»
15 years 5 months ago
Finding Resonance: Adaptive Frequency Oscillators for Dynamic Legged Locomotion
— There is much to gain from providing walking machines with passive dynamics, e.g. by including compliant elements in the structure. These elements can offer interesting propert...
Jonas Buchli, Fumiya Iida, Auke Jan Ijspeert
KCAP
2005
ACM
15 years 5 months ago
Acquisition and maintenance of constraints in engineering design
The Designers’ Workbench is a system, developed by the Advanced Knowledge Technologies (AKT) consortium to support designers in large organizations, such as RollsRoyce, by makin...
Suraj Ajit, Derek H. Sleeman, David W. Fowler, Dav...
COLT
2005
Springer
15 years 5 months ago
General Polynomial Time Decomposition Algorithms
We present a general decomposition algorithm that is uniformly applicable to every (suitably normalized) instance of Convex Quadratic Optimization and efficiently approaches an o...
Nikolas List, Hans-Ulrich Simon