Now showing items 1591-1610 of 2221

    • Preventing exploits against memory corruption vulnerabilities 

      Song, Chengyu (Georgia Institute of Technology, 2016-08-02)
      The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts toward building secure software, software systems of even modest complexity still routinely have serious vulnerabilities. More ...
    • Prices, Auctions, and Combinatorial Prophet Inequalities 

      Lucier, Brendan (2016-10-03)
      The most common way to sell resources, from apples to business licenses to concert tickets, is to post prices. A choice of prices can be viewed as an algorithm for an online stochastic optimization problem, which makes ...
    • The primary logics of programming languages 

      Winner, Robert Ian (Georgia Institute of Technology, 1975-08)
    • Primate - Inspired Vehicle Navigation Using Optic Flow and Mental Rotations 

      Arkin, Ronald C.; Dellaert, Frank; Srinivasa, Natesh; Kerwin, Ryan (Georgia Institute of Technology, 2013)
      Robot navigation already has many relatively efficient solutions: reactive control, simultaneous localization and mapping (SLAM), Rapidly-Exploring Random Trees (RRTs), etc. But many primates possess an additional inherent ...
    • A Primate-inspired Autonomous Navigation Algorithm Using the Cognitive Mechanism of Mental Rotation 

      Pettinati, Michael J.; Arkin, Ronald C. (Georgia Institute of Technology, 2014)
      Though significant progress on autonomous navigation has been made, the natural world offers interesting examples of navigational techniques that are worth exploring and understanding. The cognitive mechanism of mental ...
    • Privacy and Proportionality 

      Iachello, Giovanni (Georgia Institute of Technology, 2006-04-03)
      Over the past several years, the press, trade publications and academic literature have reported with increasing frequency on the social concerns caused by ubiquitous computingInformation Technology (IT) embedded in ...
    • Privacy Preserving Grapevines: Capturing Social Network Interactions Using Delegatable Anonymous Credentials 

      Balasubramaniyan, Vijay A.; Lee, Younho; Ahamad, Mustaque (Georgia Institute of Technology, 2009)
      A wide variety of services allow users to meet online and communicate with each other, building new social relationships and reinforcing older ones. Unfortunately, malicious entities can exploit such services for fraudulent ...
    • Probabilistic Analysis of Incremental Light Bundle Adjustment 

      Indelman, Vadim; Roberts, Richard; Dellaert, Frank (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, 2013-01)
      This paper presents a probabilistic analysis of the recently introduced incremental light bundle adjustment method (iLBA) [6]. In iLBA, the observed 3D points are algebraically eliminated, resulting in a cost ...
    • A Probabilistic Approach to the Semantic Interpretation of Building Facades 

      Alegre, Fernando; Dellaert, Frank (Georgia Institute of TechnologyCIPA, 2004)
      Semantically-enhanced 3D model reconstruction in urban environments is useful in a variety of applications, such as extracting metric and semantic information about buildings, visualizing the data in a way that outlines ...
    • Probabilistic boolean logic, arithmetic and architectures 

      Chakrapani, Lakshmi Narasimhan (Georgia Institute of Technology, 2008-08-25)
      Parameter variations, noise susceptibility, and increasing energy dissipation of CMOS devices have been recognized as major challenges in circuit and micro-architecture design in the nanometer regime. Among ...
    • Probabilistic Human Action Prediction and Wait-sensitive Planning for Responsive Human-robot Collaboration 

      Hawkins, Kelsey P.; Vo, Nam; Bansal, Shray; Bobic, Aaron F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, 2013-10)
      A novel representation for the human component of multi-step, human-robot collaborative activity is presented. The goal of the system is to predict in a probabilistic manner when the human will perform different subtasks ...
    • Probabilistic Planning for Behavior-Based Robots 

      Atrash, Amin; Koenig, Sven (Georgia Institute of Technology, 2001)
      Partially Observable Markov Decision Process models (POMDPs) have been applied to low-level robot control. We show how to use POMDPs differently, namely for sensor-planning in the context of behavior-based robot systems. ...
    • Probabilistic Structure Matching for Visual SLAM with a Multi-Camera Rig 

      Kaess, Michael; Dellaert, Frank (Georgia Institute of TechnologyElsevier, 2010-02)
      We propose to use a multi-camera rig for simultaneous localization and mapping (SLAM), providing flexibility in sensor placement on mobile robot platforms while exploiting the stronger localization constraints provided ...
    • Probabilistic Temporal Inference on Reconstructed 3D Scenes 

      Schindler, Grant; Dellaert, Frank (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, 2010)
      Modern structure from motion techniques are capable of building city-scale 3D reconstructions from large image collections, but have mostly ignored the problem of large-scale structural changes over time. We present a ...
    • Probabilistic Topological Mapping for Mobile Robots using Urn Models 

      Ranganathan, Ananth; Dellaert, Frank (Georgia Institute of Technology, 2007)
      We present an application of Bayesian modeling and inference to topological mapping in robotics. This is a potentially difficult problem due to (a) the combinatorial nature of the state space, and (b) perceptual aliasing ...
    • Probabilistic topological maps 

      Ranganathan, Ananth (Georgia Institute of Technology, 2008-03-04)
      Topological maps are light-weight, graphical representations of environments that are scalable and amenable to symbolic manipulation. Thus, they are well- suited for basic robot navigation applications, and also provide ...
    • A Probabilistic-Based Framework for INFOSEC Alert Correlation 

      Qin, Xinzhou (Georgia Institute of Technology, 2005-07-15)
      Deploying a large number of information security (INFOSEC) systems can provide in-depth protection for systems and networks. However, the sheer number of security alerts output by security sensors can overwhelm security ...
    • Problem solving in open worlds: a case study in design 

      Hinrichs, Thomas Ryland (Georgia Institute of Technology, 1991)
    • Problems in case-based reasoning 

      Miller, Raymond Edward (Georgia Institute of Technology, 1986)
    • Procedural Reduction Maps 

      Van Horn, R. Brooks, III (Georgia Institute of Technology, 2007-01-16)
      Procedural textures and image textures are commonplace in graphics today, finding uses in such places as animated movies and video games. Unlike image texture maps, procedural textures typically suffer from minification ...