Sciweavers

2497 search results - page 439 / 500
» Requirements for models of achievable routing
Sort
View
ICS
2010
Tsinghua U.
15 years 11 months ago
Distribution-Specific Agnostic Boosting
We consider the problem of boosting the accuracy of weak learning algorithms in the agnostic learning framework of Haussler (1992) and Kearns et al. (1992). Known algorithms for t...
Vitaly Feldman
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 8 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
ICRA
2009
IEEE
117views Robotics» more  ICRA 2009»
15 years 8 months ago
Safe robot arm with safe joint mechanism using nonlinear spring system for collision safety
—Collision safety between humans and robots has drawn much attention since service robots are increasingly being used in human environments. A safe robot arm based on passive com...
Jung-Jun Park, Hwi-Su Kim, Jae-Bok Song
ISMAR
2009
IEEE
15 years 8 months ago
Dynamic seethroughs: Synthesizing hidden views of moving objects
This paper presents a method to create an illusion of seeing moving objects through occluding surfaces in a video. This illusion is achieved by transferring information from a cam...
Peter Barnum, Yaser Sheikh, Ankur Datta, Takeo Kan...
ACNS
2009
Springer
168views Cryptology» more  ACNS 2009»
15 years 8 months ago
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
Abstract. We examine the use of randomness extraction and expansion in key agreement (KA) protocols to generate uniformly random keys in the standard model. Although existing works...
Yvonne Cliff, Colin Boyd, Juan Manuel Gonzá...