Sciweavers

163 search results - page 9 / 33
» Computationally Convincing Proofs of Knowledge
Sort
View
BMCBI
2008
80views more  BMCBI 2008»
13 years 7 months ago
Computational evaluation of TIS annotation for prokaryotic genomes
Background: Accurate annotation of translation initiation sites (TISs) is essential for understanding the translation initiation mechanism. However, the reliability of TIS annotat...
Gang-Qing Hu, Xiaobin Zheng, Li-Ning Ju, Huaiqiu Z...
EUROCRYPT
2007
Springer
14 years 1 months ago
Zero Knowledge and Soundness Are Symmetric
We give a complexity-theoretic characterization of the class of problems in NP having zero-knowledge argument systems. This characterization is symmetric in its treatment of the ze...
Shien Jin Ong, Salil P. Vadhan
CVPR
2006
IEEE
14 years 9 months ago
Shape-Based Approach to Robust Image Segmentation using Kernel PCA
Segmentation involves separating an object from the background. In this work, we propose a novel segmentation method combining image information with prior shape knowledge, within...
Samuel Dambreville, Yogesh Rathi, Allen Tannenbaum
VIP
2000
13 years 9 months ago
A Fuzzy Rule-Based Interactive Methodology for Training Multimedia Actors
Computer animation has come a long way during the last decade and is now capable of producing near-realistic rendered 3D computer graphics models of expressive, talking, acting hu...
Savant Karunaratne, Hong Yan
ASIAN
2006
Springer
133views Algorithms» more  ASIAN 2006»
13 years 11 months ago
Normal Proofs in Intruder Theories
Given an arbitrary intruder deduction capability, modeled as an inference system S and a protocol, we show how to compute an inference system bS such that the security problem for ...
Vincent Bernat, Hubert Comon-Lundh