Sciweavers

1414 search results - page 61 / 283
» Combining Intruder Theories
Sort
View
IACR
2011
125views more  IACR 2011»
12 years 9 months ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...
TMC
2012
12 years 10 days ago
Message Drop and Scheduling in DTNs: Theory and Practice
Abstract—In order to achieve data delivery in Delay Tolerant Networks (DTN), researchers have proposed the use of store-carryand-forward protocols: a node there may store a messa...
Amir Krifa, Chadi Barakat, Thrasyvoulos Spyropoulo...
ICML
1999
IEEE
14 years 10 months ago
Machine-Learning Applications of Algorithmic Randomness
Most machine learning algorithms share the following drawback: they only output bare predictions but not the con dence in those predictions. In the 1960s algorithmic information t...
Volodya Vovk, Alexander Gammerman, Craig Saunders
EUSFLAT
2003
13 years 11 months ago
Fuzzy-evidence approach to uncertainty modelling and reliability
Conventional approach to mathematical description of experiments applies probability theory. Here, another approach is used to express uncertainty based on probability, fuzzy sets...
Bohdan S. Butkiewicz
KR
2000
Springer
14 years 1 months ago
Reasoning with Axioms: Theory and Practice
When reasoning in description, modal or temporal logics it is often useful to consider axioms representing universal truths in the domain of discourse. Reasoning with respect to a...
Ian Horrocks, Stephan Tobies