Sciweavers

1368 search results - page 98 / 274
» Perfect Local Computability and Computable Simulations
Sort
View
RAS
2006
123views more  RAS 2006»
14 years 11 months ago
Planning exploration strategies for simultaneous localization and mapping
In this paper, we present techniques that allow one or multiple mobile robots to efficiently explore and model their environment. While much existing research in the area of Simul...
Benjamín Tovar, Lourdes Muñoz-G&oacu...
WWW
2007
ACM
16 years 8 days ago
Defeating script injection attacks with browser-enforced embedded policies
Web sites that accept and display content such as wiki articles or comments typically filter the content to prevent injected script code from running in browsers that view the sit...
Trevor Jim, Nikhil Swamy, Michael Hicks
PCM
2005
Springer
288views Multimedia» more  PCM 2005»
15 years 5 months ago
Adaptive Deinterlacing for Real-Time Applications
In general, motion compensated (MC) deinterlacing algorithms can outperform non-MC (NMC) ones. However, we often prefer to choose the latter due to the considerations of error prop...
Qian Huang, Wen Gao, Debin Zhao, Huifang Sun
ICML
2006
IEEE
16 years 12 days ago
Bayesian pattern ranking for move prediction in the game of Go
We investigate the problem of learning to predict moves in the board game of Go from game records of expert players. In particular, we obtain a probability distribution over legal...
David H. Stern, Ralf Herbrich, Thore Graepel
JSAC
2006
127views more  JSAC 2006»
14 years 11 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang