Sciweavers

1497 search results - page 163 / 300
» A Computational Model for Message Passing
Sort
View
ASIACRYPT
2005
Springer
14 years 1 months ago
Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation
Abstract. We give improved upper bounds on the communication complexity of optimally-resilient secure multiparty computation in the cryptographic model. We consider evaluating an n...
Martin Hirt, Jesper Buus Nielsen
CVPR
2007
IEEE
14 years 10 months ago
Online Spatial-temporal Data Fusion for Robust Adaptive Tracking
One problem with the adaptive tracking is that the data that are used to train the new target model often contain errors and these errors will affect the quality of the new target...
Jixu Chen, Qiang Ji
ATC
2007
Springer
14 years 2 months ago
Identity-Based Proxy Signature from Pairings
A proxy signature scheme allows an entity to delegate its signing capability to another entity (proxy) in such a way that the proxy can sign messages on behalf of the delegator. Pr...
Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xin...
COORDINATION
2009
Springer
14 years 8 months ago
Mobility Models and Behavioural Equivalence for Wireless Networks
In protocol development for wireless systems, the choice of appropriate mobility models describing the movement patterns of devices has long been recognised as a crucial factor for...
Jens Chr. Godskesen, Sebastian Nanz
CVPR
2005
IEEE
14 years 10 months ago
Multi-View Geometry for General Camera Models
We consider the structure from motion problem for a previously introduced, highly general imaging model, where cameras are modeled as possibly unconstrained sets of projection ray...
Peter F. Sturm