Sciweavers

2652 search results - page 272 / 531
» Privacy-preserving linear programming
Sort
View
101
Voted
ICRA
2006
IEEE
125views Robotics» more  ICRA 2006»
15 years 9 months ago
Optimal Information Propagation in Sensor Networks
Abstract— This paper studies the effect of communicationlink weighting schemes and long-range connections in speeding convergence to consensus on the average of the inputs to age...
Peng Yang, Randy A. Freeman, Kevin M. Lynch
118
Voted
ICRA
2006
IEEE
133views Robotics» more  ICRA 2006»
15 years 9 months ago
A Quantitative Test for the Robustness of Graspless Manipulation
Abstract— In this paper, the robustness of graspless manipulation (or nonprehensile manipulation) is investigated. We derive some new constraints for static frictional forces in ...
Yusuke Maeda, Satoshi Makita
CIMCA
2005
IEEE
15 years 9 months ago
Rankings from Fuzzy Pairwise Comparisons
We propose a new method for deriving rankings from fuzzy pairwise comparisons. It is based on the observation that quantification of the uncertainty of the pairwise comparisons sh...
Pim van den Broek, Joost Noppen
114
Voted
HASE
2005
IEEE
15 years 9 months ago
Automatic Generation of Executable Assertions for Runtime Checking Temporal Requirements
Checking various temporal requirements is a key dependability concern in safety-critical systems. As modelchecking approaches do not scale well to systems of high complexity the r...
Gergely Pintér, István Majzik
130
Voted
ISIPTA
2005
IEEE
115views Mathematics» more  ISIPTA 2005»
15 years 9 months ago
A Protocol for the Elicitation of Imprecise Probabilities
A protocol for the elicitation of imprecise probabilities based on linear programming is applied to the case of two continuous variables. Two medical experts were elicited. The re...
Alane Alves Silva, Fernando Campello de Souza