Sciweavers

240 search results - page 25 / 48
» Incorporating Tables into Proofs
Sort
View
ICISC
2003
90views Cryptology» more  ICISC 2003»
13 years 9 months ago
Providing Receipt-Freeness in Mixnet-Based Voting Protocols
Abstract. It had been thought that it is difficult to provide receiptfreeness in mixnet-based electronic voting schemes. Any kind of user chosen randomness can be used to construct...
Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Ki...
IJCGT
2011
112views more  IJCGT 2011»
12 years 11 months ago
Tactical Agent Personality
This paper proposes an automatic model-based approach that enables adaptive decision making in modern virtual games. It builds upon the Integrated MDP and POMDP Learning AgeNT (IM...
Chek Tien Tan, Ho-Lun Cheng
COCO
2003
Springer
118views Algorithms» more  COCO 2003»
14 years 1 months ago
Lower bounds for predecessor searching in the cell probe model
We consider a fundamental problem in data structures, static predecessor searching: Given a subset S of size n from the universe [m], store S so that queries of the form “What i...
Pranab Sen
ISBI
2008
IEEE
14 years 2 months ago
Theoretical analysis of complex-conjugate-ambiguity suppression in frequency-domain optical-coherence tomography
New phase-shifting techniques have recently been proposed to suppress the complex-conjugate ambiguity in frequencydomain optical-coherence tomography. A phase shift is introduced,...
S. Chandra Sekhar, Roland Michaely, Rainer A. Leit...
DEXAW
2006
IEEE
188views Database» more  DEXAW 2006»
14 years 1 months ago
A Protocol for Secure Content Distribution in Pure P2P Networks
A significant challenge for Peer-to-Peer (P2P) systems is maintaining the correctness and consistency of their global data structures and shared contents as peers independently a...
Esther Palomar, Juan M. Estévez-Tapiador, J...