Results 1  10
of
435
Probabilistic Roadmaps for Path Planning in HighDimensional Configuration Spaces
 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION
, 1996
"... A new motion planning method for robots in static workspaces is presented. This method proceeds in two phases: a learning phase and a query phase. In the learning phase, a probabilistic roadmap is constructed and stored as a graph whose nodes correspond to collisionfree configurations and whose edg ..."
Abstract

Cited by 1277 (120 self)
 Add to MetaCart
be done in a fraction of a second on a contemporary workstation (=150 MIPS), after learning for relatively short periods of time (a few dozen seconds)
Logistic Regression in Rare Events Data
, 1999
"... We study rare events data, binary dependent variables with dozens to thousands of times fewer ones (events, such as wars, vetoes, cases of political activism, or epidemiological infections) than zeros (“nonevents”). In many literatures, these variables have proven difficult to explain and predict, a ..."
Abstract

Cited by 169 (4 self)
 Add to MetaCart
We study rare events data, binary dependent variables with dozens to thousands of times fewer ones (events, such as wars, vetoes, cases of political activism, or epidemiological infections) than zeros (“nonevents”). In many literatures, these variables have proven difficult to explain and predict
The Beirut Dozen: Traditional domestic garden as spatial and cultural mediator
"... Traditional domestic gardens in Beirut are associated with the detached house typology that appear in the second half of the nineteenth century. Inspired by rural origins, the domestic garden nevertheless evolved by taking on new spatial and cultural dimensions. This study explores these dimensions. ..."
Abstract
 Add to MetaCart
Traditional domestic gardens in Beirut are associated with the detached house typology that appear in the second half of the nineteenth century. Inspired by rural origins, the domestic garden nevertheless evolved by taking on new spatial and cultural dimensions. This study explores these dimensions
Towards parameterfree data mining
 In: Proc. 10th ACM SIGKDD Intn’l Conf. Knowledge Discovery and Data Mining
, 2004
"... Most data mining algorithms require the setting of many input parameters. Two main dangers of working with parameterladen algorithms are the following. First, incorrect settings may cause an algorithm to fail in finding the true patterns. Second, a perhaps more insidious problem is that the algorit ..."
Abstract

Cited by 145 (19 self)
 Add to MetaCart
Most data mining algorithms require the setting of many input parameters. Two main dangers of working with parameterladen algorithms are the following. First, incorrect settings may cause an algorithm to fail in finding the true patterns. Second, a perhaps more insidious problem
Six of one, half dozen of the other: Expanding and contracting numerical dimensions produces preference reversals
 Psychological Science
, 2009
"... ABSTRACTThe scales used to describe the attributes of different choice options are usually open to alternative expressions, such as inches versus feet or minutes versus hours. More generally, a ratio scale can be multiplied by an arbitrary factor (e.g., 12) while preserving all of the information ..."
Abstract

Cited by 7 (2 self)
 Add to MetaCart
strong manipulation such that, when one attribute was expanded, the other was contracted. The second scenario presented movierental plans, in which we manipulated the expansion of one attribute (new movies per period of time) while leaving the other attribute (cost) untouched. We predicted that, in both
Quantitative methods in psychology: A power primer
 Psychological Bulletin
, 1992
"... One possible reason for the continued neglect of statistical power analysis in research in the behavioral sciences is the inaccessibility of or difficulty with the standard material. A convenient, although not comprehensive, presentation of required sample sizes is provided here. Effectsize indexe ..."
Abstract

Cited by 118 (0 self)
 Add to MetaCart
partial correlation. The preface to the first edition of my power handbook During my first dozen years of teaching and consulting on applied statistics with behavioral scientists, I became increasingly impressed with the importance of statistical power analysis, an importance which was increased an order
Probabilistic Roadmaps for Robot Path Planning
, 1998
"... The Probabilistic RoadMap planner (PRM) has been applied with success to multiple planning problems involving robots with 3 to 16 degrees of freedom (dof) operating in known static environments. This paper describes the planner and reports on experimental and theoretical results related to its perfo ..."
Abstract

Cited by 67 (5 self)
 Add to MetaCart
of the robot to two nodes of the roadmap and computes a path through the roadmap between these two nodes. The planner is able to find paths involving robots with 10 dof in a fraction of a second after relatively short times for preprocessing (a few dozen seconds). Theoretical analysis of the PRM algorithm
Header Space Analysis: Static Checking For Networks
"... Today’s networks typically carry or deploy dozens of protocols and mechanisms simultaneously such as MPLS, NAT, ACLs and route redistribution. Even when individual protocols function correctly, failures can arise from the complex interactions of their aggregate, requiring network administrators to b ..."
Abstract

Cited by 119 (12 self)
 Add to MetaCart
Today’s networks typically carry or deploy dozens of protocols and mechanisms simultaneously such as MPLS, NAT, ACLs and route redistribution. Even when individual protocols function correctly, failures can arise from the complex interactions of their aggregate, requiring network administrators
Möbius voting for surface correspondence
 ACM TRANS. GRAPH. (PROC. SIGGRAPH
, 2009
"... The goal of our work is to develop an efficient, automatic algorithm for discovering point correspondences between surfaces that are approximately and/or partially isometric. Our approach is based on three observations. First, isometries are a subset of the Möbius group, which has lowdimensionality ..."
Abstract

Cited by 114 (10 self)
 Add to MetaCart
dimensionality – six degrees of freedom for topological spheres, and three for topological discs. Second, computing the Möbius transformation that interpolates any three points can be computed in closedform after a midedge flattening to the complex plane. Third, deviations from isometry can be modeled by a
Instant CiphertextOnly Cryptanalysis of GSM Encrypted Communication
 Advances in Cryptology, proceedings of CRYPTO 2003, Lecture Notes in Computer Science 2729
"... Abstract. In this paper we present a very practical ciphertextonly cryptanalysis of GSM encrypted communication, and various active attacks on the GSM protocols. These attacks can even break into GSM networks that use “unbreakable ” ciphers. We describe a ciphertextonly attack on A5/2 that require ..."
Abstract

Cited by 104 (2 self)
 Add to MetaCart
/2 that requires a few dozen milliseconds of encrypted offtheair cellular conversation and finds the correct key in less than a second on a personal computer. We then extend this attack to a (more complex) ciphertextonly attack on A5/1. We describe new attacks on the protocols of networks that use A5/1, A5
Results 1  10
of
435