Sciweavers

17288 search results - page 3271 / 3458
» Hybrid Optimizations: Which Optimization Algorithm to Use
Sort
View
150
Voted
TIT
2008
187views more  TIT 2008»
15 years 3 months ago
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Abstract--In the bounded-storage model (BSM) for information-theoretic secure encryption and key agreement, one makes use of a random string R whose length t is greater than the as...
Stefan Dziembowski, Ueli M. Maurer
ICRA
2010
IEEE
142views Robotics» more  ICRA 2010»
15 years 2 months ago
Learning and planning high-dimensional physical trajectories via structured Lagrangians
— We consider the problem of finding sufficiently simple models of high-dimensional physical systems that are consistent with observed trajectories, and using these models to s...
Paul Vernaza, Daniel D. Lee, Seung-Joon Yi
ICRA
2010
IEEE
138views Robotics» more  ICRA 2010»
15 years 2 months ago
Mapping indoor environments based on human activity
— We present a novel approach to build approximate maps of structured environments utilizing human motion and activity. Our approach uses data recorded with a data suit which is ...
Slawomir Grzonka, Frederic Dijoux, Andreas Karwath...
ITIIS
2010
151views more  ITIIS 2010»
15 years 2 months ago
Practical Data Transmission in Cluster-Based Sensor Networks
Data routing in wireless sensor networks must be energy-efficient because tiny sensor nodes have limited power. A cluster-based hierarchical routing is known to be more efficient ...
Dae Young Kim, Jinsung Cho, Byeong-Soo Jeong
JAIR
2010
139views more  JAIR 2010»
15 years 2 months ago
Multiattribute Auctions Based on Generalized Additive Independence
We develop multiattribute auctions that accommodate generalized additive independent (GAI) preferences. We propose an iterative auction mechanism that maintains prices on potentia...
Yagil Engel, Michael P. Wellman
« Prev « First page 3271 / 3458 Last » Next »