Sciweavers

2168 search results - page 236 / 434
» Randomized Algorithms and Complexity Theory
Sort
View
ICPR
2008
IEEE
15 years 10 months ago
Direct 3-D shape recovery from image sequence based on multi-scale Bayesian network
We propose a new method for recovering a 3-D object shape from an image sequence. In order to recover high-resolution relative depth without using the complex Markov random field...
Norio Tagawa, Junya Kawaguchi, Shoichi Naganuma, K...
IROS
2008
IEEE
113views Robotics» more  IROS 2008»
15 years 10 months ago
Motion planning for urban driving using RRT
— This paper provides a detailed analysis of the motion planning subsystem for the MIT DARPA Urban Challenge vehicle. The approach is based on the Rapidly-exploring Random Trees ...
Yoshiaki Kuwata, Gaston A. Fiore, Justin Teo, Emil...
GLOBECOM
2006
IEEE
15 years 9 months ago
Sensor Localization from WLS Optimization with Closed-form Gradient and Hessian
— A non-parametric, low-complexity algorithm for accurate and simultaneous localization of multiple sensors from scarce and imperfect ranging information is proposed. The techniq...
Giuseppe Destino, Giuseppe Thadeu Freitas de Abreu
COCO
2008
Springer
100views Algorithms» more  COCO 2008»
15 years 5 months ago
Detecting Rational Points on Hypersurfaces over Finite Fields
We study the complexity of deciding whether a given homogeneous multivariate polynomial has a nontrivial root over a finite field. Given a homogeneous algebraic circuit C that com...
Swastik Kopparty, Sergey Yekhanin
IACR
2011
116views more  IACR 2011»
14 years 3 months ago
Some Words About Cryptographic Key Recognition In Data Streams
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at...
Alexey Chilikov, Evgeny Alekseev