Sciweavers

634 search results - page 117 / 127
» Groundwork for Weak Analysis
Sort
View
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
14 years 4 months ago
Almost Optimal Bounds for Direct Product Threshold Theorem
Abstract. We consider weakly-verifiable puzzles which are challengeresponse puzzles such that the responder may not be able to verify for itself whether it answered the challenge ...
Charanjit S. Jutla
CVPR
2010
IEEE
2187views Computer Vision» more  CVPR 2010»
14 years 3 months ago
3D Scene Priors for Road Detection
Vision-based road detection is important in different areas of computer vision such as autonomous driving, car collision warning and pedestrian crossing detection. However, curre...
Jose M. Alvarez, Theo Gevers, Antonio M. Lopez
SC
2009
ACM
14 years 2 months ago
Enabling high-fidelity neutron transport simulations on petascale architectures
The UNIC code is being developed as part of the DOE’s Nuclear Energy Advanced Modeling and Simulation (NEAMS) program. UNIC is an unstructured, deterministic neutron transport c...
Dinesh K. Kaushik, Micheal Smith, Allan Wollaber, ...
GLOBECOM
2009
IEEE
14 years 2 months ago
Real-World VANET Security Protocol Performance
—Many results have been published in the literature based on performance measurements obtained from simulations of Vehicular Networks (VANETs). These simulations use as input tra...
Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux
GLOBECOM
2009
IEEE
14 years 2 months ago
Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security
—The emerging biometric cryptography has gained significant interests for key management and privacy protection, but the previously proposed schemes using set metrics for finge...
Jinyang Shi, Kwok-Yan Lam, Ming Gu, Husheng Li