Sciweavers

189 search results - page 29 / 38
» Leakage-Resilient Zero Knowledge
Sort
View
TIT
1998
71views more  TIT 1998»
13 years 9 months ago
Convolutional Encoder State Estimation
—To estimate the convolutional encoder state from received data, one may use the inverse to the encoder G. However, channel errors make this method unreliable. We propose a metho...
A. J. Han Vinck, Petr Dolezal, Young Gil Kim
TSP
2010
13 years 4 months ago
Variance-component based sparse signal reconstruction and model selection
We propose a variance-component probabilistic model for sparse signal reconstruction and model selection. The measurements follow an underdetermined linear model, where the unknown...
Kun Qiu, Aleksandar Dogandzic
ICWS
2009
IEEE
13 years 7 months ago
Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes
The WS-BPEL specification focuses on business processes the activities of which are assumed to be interactions with Web services. However, WS-BPEL processes go beyond the orchestr...
Federica Paci, Rodolfo Ferrini, Elisa Bertino
ESORICS
2007
Springer
14 years 4 months ago
Towards Modeling Trust Based Decisions: A Game Theoretic Approach
Current trust models enable decision support at an implicit level by means of thresholds or constraint satisfiability. Decision support is mostly included only for a single binary...
Vidyaraman Sankaranarayanan, Madhusudhanan Chandra...
DOCENG
2004
ACM
14 years 3 months ago
Creation of topic map by identifying topic chain in chinese
XML Topic maps enable multiple, concurrent views of sets of information objects and can be used to different applications. For example, thesaurus-like interfaces to corpora, navig...
Ching-Long Yeh, Yi-Chun Chen