Sciweavers

208 search results - page 18 / 42
» Computing Anonymously with Arbitrary Knowledge
Sort
View
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 10 months ago
Abstraction for Epistemic Model Checking of Dining Cryptographers-based Protocols
ion for Epistemic Model Checking of Dining Cryptographers-based Protocols Omar I. Al-Bataineh and Ron van der Meyden School of Computer Science and Engineering, University of New S...
Omar I. Al-Bataineh, Ron van der Meyden
IJCV
1998
101views more  IJCV 1998»
13 years 9 months ago
Synthesis of Novel Views from a Single Face Image
Images formed by a human face change with viewpoint. A new technique is described for synthesizing images of faces from new viewpoints, when only a single 2D image is available. A...
Thomas Vetter
EUROPKI
2009
Springer
13 years 7 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
KES
2005
Springer
14 years 3 months ago
Sustainable Memory System Using Global and Conical Spaces
: We present a concept and implementation of a computational support for spatial memory management and describe its temporal evolution. Our essential idea is to use an immersible g...
Hidekazu Kubota, Satoshi Nomura, Yasuyuki Sumi, To...
CDC
2009
IEEE
133views Control Systems» more  CDC 2009»
14 years 2 months ago
Arbitrarily modulated Markov decision processes
— We consider decision-making problems in Markov decision processes where both the rewards and the transition probabilities vary in an arbitrary (e.g., nonstationary) fashion. We...
Jia Yuan Yu, Shie Mannor