Sciweavers

135 search results - page 23 / 27
» A New Self-Healing Key Distribution Scheme
Sort
View
TCC
2010
Springer
178views Cryptology» more  TCC 2010»
14 years 6 months ago
Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems
We present a variant of Regev’s cryptosystem first presented in [Reg05], but with a new choice of parameters. By a recent classical reduction by Peikert we prove the scheme sema...
Rikke Bendlin, Ivan Damgård
ICB
2009
Springer
141views Biometrics» more  ICB 2009»
14 years 4 months ago
Towards Structured Approaches to Arbitrary Data Selection and Performance Prediction for Speaker Recognition
We developed measures relating feature vector distributions to speaker recognition (SR) performances for performance prediction and potential arbitrary data selection for SR. We ex...
Howard Lei
IWAN
1999
Springer
14 years 2 months ago
ANMAC: An Architectural Framework for Network Management and Control using Active Networks
In this paper, we propose a new framework called Active Network Management and Control (ANMAC) for the management and control of high speed networks. The software architecture in A...
Samphel Norden, Kenneth F. Wong
CAD
2010
Springer
13 years 9 months ago
Feature aligned quad dominant remeshing using iterative local updates
In this paper we present a new algorithm which turns an unstructured triangle mesh into a quad-dominant mesh with edges well aligned to the principal directions of the underlying ...
Yu-Kun Lai, Leif Kobbelt, Shi-Min Hu
ECCV
2010
Springer
14 years 4 days ago
Depth-Encoded Hough Voting for joint object detection and shape recovery
Detecting objects, estimating their pose and recovering 3D shape information is a critical problem in many vision and robotics applications. This paper addresses the above needs by...