Sciweavers

1188 search results - page 157 / 238
» States of Knowledge
Sort
View
SACRYPT
2001
Springer
123views Cryptology» more  SACRYPT 2001»
15 years 3 months ago
Weaknesses in the Key Scheduling Algorithm of RC4
Abstract. Inthis paper we present several weaknesses in the keyscheduling algorithm of RC4, and describe their cryptanalytic signi cance. We identify a large number of weak keys, i...
Scott R. Fluhrer, Itsik Mantin, Adi Shamir
TWC
2010
14 years 5 months ago
Distributed Multicell-MISO Precoding Using the Layered Virtual SINR Framework
In this letter, we address the problem of distributed multi-antenna cooperative transmission in a cellular system. Most research in this area has so far assumed that base stations ...
Randa Zakhour, David Gesbert
WCE
2007
15 years 12 min ago
A Proactive Horizontal Handover Algorithm for WiFi-WiMax Interoperable Networks
— Two important high bandwidth wireless certifications in our days are Worldwide Interoperability for Microwave Access (WiMax) and Wireless Fidelity (WiFi). They can interoperate...
Álvaro Suárez Sarmiento, Kholoud Elb...
110
Voted
KI
2010
Springer
14 years 8 months ago
A Testbed for Adaptive Human-Robot Collaboration
Abstract. This paper presents a novel method for developing and evaluating intelligent robot behavior for joint human-robot activities. We extended a physical simulation of an auto...
Alexandra Kirsch, Yuxiang Chen
ATAL
2005
Springer
15 years 4 months ago
Improving reinforcement learning function approximators via neuroevolution
Reinforcement learning problems are commonly tackled with temporal difference methods, which use dynamic programming and statistical sampling to estimate the long-term value of ta...
Shimon Whiteson