Sciweavers

139 search results - page 20 / 28
» Cryptographic Randomized Response Techniques
Sort
View
PROVSEC
2009
Springer
14 years 2 months ago
Oracle Separation in the Non-uniform Model
Abstract. Oracle separation methods are used in cryptography to rule out blackbox reductions between cryptographic primitives. It is sufficient to find an oracle relative to whic...
Ahto Buldas, Sven Laur, Margus Niitsoo
ICIP
2007
IEEE
14 years 11 months ago
Analysis of the Decoding-Complexity of Compressed Image-Based Scene Representations
Interactive navigation in image-based scenes requires random access to the compressed reference image data. When using state of the art block-based hybrid video coding techniques,...
Ingo Bauermann, Eckehard G. Steinbach
FUN
2010
Springer
306views Algorithms» more  FUN 2010»
14 years 2 months ago
Leveling-Up in Heroes of Might and Magic III
We propose a model for level-ups in Heroes of Might and Magic III, and give an O 1 ε2 ln 1 δ learning algorithm to estimate the probabilities of secondary skills induced by any ...
Dimitrios I. Diochnos
JCP
2006
92views more  JCP 2006»
13 years 9 months ago
A Novel Pulse Echo Correlation Tool for Transmission Path Testing and Fault Diagnosis
Abstract-- In this paper a novel pulse sequence testing methodology is presented [22] as an alternative to Time Domain Reflectometry (TDR) for transmission line health condition mo...
David M. Horan, Richard A. Guinee
ICWN
2004
13 years 11 months ago
RED for Improving TCP over Wireless Networks
TCP was designed and tuned to work well on networks where losses are mainly congestion losses. The performance of TCP decreases dramatically when a TCP connection traverses a wire...
Saad Biaz, Xia Wang