Sciweavers

13457 search results - page 130 / 2692
» Can we elect if we cannot compare
Sort
View
JCST
2007
98views more  JCST 2007»
13 years 9 months ago
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004
Group signature schemes allow a member of a group to sign messages anonymously on behalf of the group. In the case of later dispute, a designated group manager can revoke the anony...
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
FSTTCS
2010
Springer
13 years 7 months ago
Finding Independent Sets in Unions of Perfect Graphs
ABSTRACT. The maximum independent set problem (MAXIS) on general graphs is known to be NPhard to approximate within a factor of n1-, for any > 0. However, there are many "...
Venkatesan T. Chakaravarthy, Vinayaka Pandit, Samb...
PPAM
2005
Springer
14 years 2 months ago
Enabling Remote Method Invocations in Peer-to-Peer Environments: RMIX over JXTA
In this paper, we present a peer-to-peer (P2P) system with remote method invocations, combining RMIX and JXTA technologies, and underpinning the H2O distributed resource sharing pl...
Pawel Jurczyk, Maciej Golenia, Maciej Malawski, Da...
JMLR
2006
125views more  JMLR 2006»
13 years 9 months ago
Linear Programming Relaxations and Belief Propagation - An Empirical Study
The problem of finding the most probable (MAP) configuration in graphical models comes up in a wide range of applications. In a general graphical model this problem is NP hard, bu...
Chen Yanover, Talya Meltzer, Yair Weiss
ACCV
2006
Springer
14 years 3 months ago
A Novel Robust Statistical Method for Background Initialization and Visual Surveillance
In many visual tracking and surveillance systems, it is important to initialize a background model using a training video sequence which may include foreground objects. In such a c...
Hanzi Wang, David Suter