Sciweavers

897 search results - page 108 / 180
» Identity: How to name it, How to find it
Sort
View
HRI
2007
ACM
15 years 5 months ago
On-line behaviour classification and adaptation to human-robot interaction styles
This paper presents a proof-of-concept of a robot that is adapting its behaviour on-line, during interactions with a human according to detected play styles. The study is part of ...
Dorothée François, Daniel Polani, Ke...
ESA
2006
Springer
147views Algorithms» more  ESA 2006»
15 years 5 months ago
Univariate Polynomial Real Root Isolation: Continued Fractions Revisited
We present algorithmic, complexity and implementation results concerning real root isolation of integer univariate polynomials using the continued fraction expansion of real algeb...
Elias P. Tsigaridas, Ioannis Z. Emiris
LANMR
2007
15 years 3 months ago
Handling Exceptions in nonmonotonic reasoning
Abstract We introduce some differences in the style defeasible information is represented and inferences are made in nonmonotonic reasoning. These, at first sight harmless, chang...
Marcelino C. Pequeno, Rodrigo de M. S. Veras, Wlad...
SECRYPT
2007
121views Business» more  SECRYPT 2007»
15 years 3 months ago
Using Steganography to Improve Hash Functions' Collision Resistance
Lately, hash function security has received increased attention. Especially after the recent attacks that were presented for SHA-1 and MD5, the need for a new and more robust hash...
Emmanouel Kellinis, Konstantinos Papapanagiotou
AAAI
2006
15 years 3 months ago
A Platform to Evaluate the Technology for Service Discovery in the Semantic Web
Since the description of the Semantic Web paradigm in 2001, technology has been proposed to allow its deployment and use. However, there is not yet any large and widely deployed s...
Cécile Aberg, Johan Aberg, Patrick Lambrix,...