Sciweavers

211 search results - page 28 / 43
» A Message Recognition Protocol Based on Standard Assumptions
Sort
View
AAAI
2008
13 years 10 months ago
A Fast Data Collection and Augmentation Procedure for Object Recognition
When building an application that requires object class recognition, having enough data to learn from is critical for good performance, and can easily determine the success or fai...
Benjamin Sapp, Ashutosh Saxena, Andrew Y. Ng
PERCOM
2003
ACM
14 years 7 months ago
Evaluation of Kalman Filtering for Network Time Keeping
Time information is critical for a variety of applications in distributed environments that facilitate pervasive computing and communication. This work describes and evaluates a no...
Aggelos Bletsas
MIDDLEWARE
2004
Springer
14 years 1 months ago
The Peer Sampling Service: Experimental Evaluation of Unstructured Gossip-Based Implementations
In recent years, the gossip-based communication model in large-scale distributed systems has become a general paradigm with important applications which include information dissemi...
Márk Jelasity, Rachid Guerraoui, Anne-Marie...
CCS
2007
ACM
14 years 2 months ago
Chosen-ciphertext secure proxy re-encryption
In a proxy re-encryption (PRE) scheme, a proxy is given special information that allows it to translate a ciphertext under one key into a ciphertext of the same message under a di...
Ran Canetti, Susan Hohenberger
TCC
2005
Springer
103views Cryptology» more  TCC 2005»
14 years 1 months ago
Fair-Zero Knowledge
Abstract. We introduce Fair Zero-Knowledge, a multi-verifier ZK system where every proof is guaranteed to be “zero-knowledge for all verifiers.” That is, if an honest verifi...
Matt Lepinski, Silvio Micali, Abhi Shelat