Sciweavers

1995 search results - page 302 / 399
» The Chemical Abstract Machine
Sort
View
TCC
2007
Springer
93views Cryptology» more  TCC 2007»
15 years 10 months ago
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Abstract. We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to...
David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke L...
UCS
2007
Springer
15 years 10 months ago
Discriminative Temporal Smoothing for Activity Recognition from Wearable Sensors
Abstract. This paper describes daily life activity recognition using wearable acceleration sensors attached to four different parts of the human body. The experimental data set con...
Jaakko Suutala, Susanna Pirttikangas, Juha Rö...
126
Voted
FCCM
2006
IEEE
101views VLSI» more  FCCM 2006»
15 years 10 months ago
A Type Architecture for Hybrid Micro-Parallel Computers
Recently, platform FPGAs that integrate sequential processors with a spatial fabric have become prevalent. While these hybrid architectures ease the burden of integrating sequenti...
Benjamin Ylvisaker, Brian Van Essen, Carl Ebeling
ICRA
2006
IEEE
128views Robotics» more  ICRA 2006»
15 years 10 months ago
Collision Detection of Cylindrical Rigid Bodies for Motion Planning
Abstract— This paper presents a novel methodology for detecting collisions of cylindrically shaped rigid bodies moving in three dimensions. This algorithm uses line geometry and ...
John Ketchell, Pierre M. Larochelle
IROS
2006
IEEE
274views Robotics» more  IROS 2006»
15 years 10 months ago
Adaptive Scale Robust Segmentation for 2D Laser Scanner
Abstract— This paper presents a robust algorithm for segmentation and line detection in 2D range scans. The described method exploits the multimodal probability density function ...
Ruben Martinez-Cantin, José A. Castellanos,...