Sciweavers

208 search results - page 12 / 42
» Computing Anonymously with Arbitrary Knowledge
Sort
View
CVPR
2004
IEEE
15 years 2 days ago
Multibody Factorization with Uncertainty and Missing Data Using the EM Algorithm
Multibody factorization algorithms [2, 1, 16] give an elegant and simple solution to the problem of structure from motion even for scenes containing multiple independent motions. ...
Amit Gruber, Yair Weiss
ICIP
2007
IEEE
14 years 11 months ago
Geometric Calibration of Third-Generation Computed Tomography Scanners from Scans of Unknown Objects using Complementary Rays
To achieve good image quality for computed tomography scans, it is important to accurately know the geometrical relationship between the x-ray source, detector, and axis of rotati...
Kevin M. Holt
SPAA
2010
ACM
14 years 2 months ago
Delays induce an exponential memory gap for rendezvous in trees
The aim of rendezvous in a graph is meeting of two mobile agents at some node of an unknown anonymous connected graph. The two identical agents start from arbitrary nodes in the g...
Pierre Fraigniaud, Andrzej Pelc
CRYPTO
2011
Springer
180views Cryptology» more  CRYPTO 2011»
12 years 10 months ago
Leakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
Sanjam Garg, Abhishek Jain 0002, Amit Sahai
SDM
2009
SIAM
331views Data Mining» more  SDM 2009»
14 years 7 months ago
Privacy Preservation in Social Networks with Sensitive Edge Weights.
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of con...
Jie Wang, Jinze Liu, Jun Zhang, Lian Liu