Sciweavers

1058 search results - page 111 / 212
» It's Doomed; We Can Prove It
Sort
View
FC
2005
Springer
104views Cryptology» more  FC 2005»
14 years 3 months ago
Event Driven Private Counters
We define and instantiate a cryptographic scheme called “private counters”, which can be used in applications such as preferential voting to express and update preferences (or...
Eu-Jin Goh, Philippe Golle
ICML
2004
IEEE
14 years 3 months ago
Towards tight bounds for rule learning
While there is a lot of empirical evidence showing that traditional rule learning approaches work well in practice, it is nearly impossible to derive analytical results about thei...
Ulrich Rückert, Stefan Kramer
SP
2003
IEEE
136views Security Privacy» more  SP 2003»
14 years 3 months ago
Secret Handshakes from Pairing-Based Key Agreements
Consider a CIA agent who wants to authenticate herself to a server, but does not want to reveal her CIA credentials unless the server is a genuine CIA outlet. Consider also that t...
Dirk Balfanz, Glenn Durfee, Narendar Shankar, Dian...
ICML
2003
IEEE
14 years 3 months ago
The Influence of Reward on the Speed of Reinforcement Learning: An Analysis of Shaping
Shaping can be an effective method for improving the learning rate in reinforcement systems. Previously, shaping has been heuristically motivated and implemented. We provide a for...
Adam Laud, Gerald DeJong
POPL
1999
ACM
14 years 2 months ago
Software Watermarking: Models and Dynamic Embeddings
Watermarking embeds a secret message into a cover message. In media watermarking the secret is usually a copyright notice and the cover a digital image. Watermarking an object dis...
Christian S. Collberg, Clark D. Thomborson