Sciweavers

998 search results - page 54 / 200
» From Feasible Proofs to Feasible Computations
Sort
View
GI
2001
Springer
14 years 1 months ago
Private Information Retrieval
In e-commerce, the protection of user privacy from a server was not considered feasible until the private information retrieval (PIR) problem was stated recently. A PIR protocol a...
Dmitri Asonov
ACCV
2009
Springer
14 years 25 days ago
Fingerspelling Recognition through Classification of Letter-to-Letter Transitions
Abstract. We propose a new principle for recognizing fingerspelling sequences from American Sign Language (ASL). Instead of training a system to recognize the static posture for ea...
Susanna Ricco, Carlo Tomasi
IPPS
2006
IEEE
14 years 2 months ago
Plan switching: an approach to plan execution in changing environments
The execution of a complex task in any environment requires planning. Planning is the process of constructing an activity graph given by the current state of the system, a goal st...
Han Yu, Dan C. Marinescu, Annie S. Wu, Howard Jay ...
GCC
2004
Springer
14 years 2 months ago
EM Medical Image Reconstruction in a Peer-to-Peer Systems
Medical image reconstruction remains a topic of interest to medical researchers. Although the algorithms have become more mature, one particular challenge has persisted over the de...
Jun Ni, Tao He, Xiang Li, Shaowen Wang, Ge Wang
EUROCRYPT
2010
Springer
14 years 1 months ago
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck W...