Sciweavers

86 search results - page 10 / 18
» Impossibility Results for Secret Establishment
Sort
View
CRYPTO
2008
Springer
98views Cryptology» more  CRYPTO 2008»
13 years 9 months ago
One-Time Programs
Abstract. In this work, we introduce one-time programs, a new computational paradigm geared towards security applications. A one-time program can be executed on a single input, who...
Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothbl...
ICIP
2009
IEEE
14 years 8 months ago
Towards A Low Cost Multi-camera Marker Based Human Motion Capture System
This paper presents a low cost real-time alternative to available commercial human motion capture systems. First, a set of distinguishable markers are placed on several human body...
CORR
2010
Springer
188views Education» more  CORR 2010»
13 years 7 months ago
A unified framework for high-dimensional analysis of $M$-estimators with decomposable regularizers
High-dimensional statistical inference deals with models in which the the number of parameters p is comparable to or larger than the sample size n. Since it is usually impossible ...
Sahand Negahban, Pradeep Ravikumar, Martin J. Wain...
SAGT
2010
Springer
175views Game Theory» more  SAGT 2010»
13 years 6 months ago
On Learning Algorithms for Nash Equilibria
Can learning algorithms find a Nash equilibrium? This is a natural question for several reasons. Learning algorithms resemble the behavior of players in many naturally arising gam...
Constantinos Daskalakis, Rafael Frongillo, Christo...
ICCV
2005
IEEE
14 years 9 months ago
A Theory of Refractive and Specular 3D Shape by Light-Path Triangulation
We investigate the feasibility of reconstructing an arbitrarily-shaped specular scene (refractive or mirror-like) from one or more viewpoints. By reducing shape recovery to the pr...
Kiriakos N. Kutulakos, Eron Steger