Sciweavers

2659 search results - page 391 / 532
» Do we mean the same
Sort
View
EATCS
1998
250views more  EATCS 1998»
15 years 4 months ago
Human Visual Perception and Kolmogorov Complexity: Revisited
Experiments have shown [2] that we can only memorize images up to a certain complexity level, after which, instead of memorizing the image itself, we, sort of, memorize a probabil...
Vladik Kreinovich, Luc Longpré
MST
2011
200views Hardware» more  MST 2011»
14 years 11 months ago
Performance of Scheduling Policies in Adversarial Networks with Non-synchronized Clocks
In this paper we generalize the Continuous Adversarial Queuing Theory (CAQT) model [5] by considering the possibility that the router clocks in the network are not synchronized. W...
Antonio Fernández Anta, José Luis L&...
139
Voted
DIM
2006
ACM
15 years 10 months ago
User centricity: a taxonomy and open issues
User centricity is a significant concept in federated identity management (FIM), as it provides for stronger user control and privacy. However, several notions of user-centricity...
Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas ...
SIGECOM
2005
ACM
122views ECommerce» more  SIGECOM 2005»
15 years 10 months ago
Robust solutions for combinatorial auctions
Bids submitted in auctions are usually treated as enforceable commitments in most bidding and auction theory literature. In reality bidders often withdraw winning bids before the ...
Alan Holland, Barry O'Sullivan
WPES
2003
ACM
15 years 10 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More