Sciweavers

3055 search results - page 461 / 611
» Randomized Search Trees
Sort
View
ICRA
2009
IEEE
176views Robotics» more  ICRA 2009»
15 years 11 months ago
Path planning in 1000+ dimensions using a task-space Voronoi bias
— The reduction of the kinematics and/or dynamics of a high-DOF robotic manipulator to a low-dimension “task space” has proven to be an invaluable tool for designing feedback...
Alexander C. Shkolnik, Russ Tedrake
ICC
2008
IEEE
15 years 11 months ago
A Two-Stage Sensing Technique for Dynamic Spectrum Access
—Dynamic spectrum access (DSA) is a promising approach for mitigating spectrum scarcity. Underlying DSA is the need for fast and reliable spectrum sensing over a potentially larg...
Ling Luo, Sumit Roy
DATE
2007
IEEE
84views Hardware» more  DATE 2007»
15 years 10 months ago
On test generation by input cube avoidance
Test generation procedures attempt to assign values to the inputs of a circuit so as to detect target faults. We study a complementary view whereby the goal is to identify values ...
Irith Pomeranz, Sudhakar M. Reddy
AUSDM
2007
Springer
84views Data Mining» more  AUSDM 2007»
15 years 10 months ago
Detecting Anomalous Longitudinal Associations Through Higher Order Mining
The detection of unusual or anomalous data is an important function in automated data analysis or data mining. However, the diversity of anomaly detection algorithms shows that it...
Ping Liang, John F. Roddick
PROVSEC
2007
Springer
15 years 10 months ago
Decryptable Searchable Encryption
As such, public-key encryption with keyword search (a.k.a PEKS or searchable encryption) does not allow the recipient to decrypt keywords i.e. encryption is not invertible. This pa...
Thomas Fuhr, Pascal Paillier