Sciweavers

189 search results - page 31 / 38
» Leakage-Resilient Zero Knowledge
Sort
View
CP
2004
Springer
14 years 3 months ago
How Much Backtracking Does It Take to Color Random Graphs? Rigorous Results on Heavy Tails
Many backtracking algorithms exhibit heavy-tailed distributions, in which their running time is often much longer than their median. We analyze the behavior of two natural variant...
Haixia Jia, Cristopher Moore
IAT
2003
IEEE
14 years 3 months ago
Integrating Reinforcement Learning, Bidding and Genetic Algorithms
This paper presents a multi-agent reinforcement learning bidding approach (MARLBS) for performing multi-agent reinforcement learning. MARLBS integrates reinforcement learning, bid...
Dehu Qi, Ron Sun
ICRA
1993
IEEE
108views Robotics» more  ICRA 1993»
14 years 2 months ago
Models for Diagnosing Robot Error Sources
Accuracy of a machine is determined by its ability to position and orient a tool at a prescribed point. Usually this positioning is performed by positioning joints (actuators The ...
Louis J. Everett
FC
2000
Springer
127views Cryptology» more  FC 2000»
14 years 1 months ago
Blind, Auditable Membership Proofs
Auditability is an important property in nancial systems and architectures. Here we de ne the primitive of blind auditable membership proof" BAMP which combines public auditab...
Tomas Sander, Amnon Ta-Shma, Moti Yung
CRYPTO
1995
Springer
135views Cryptology» more  CRYPTO 1995»
14 years 1 months ago
Committed Oblivious Transfer and Private Multi-Party Computation
Abstract. In this paper we present an eficient protocol for “Committed Oblivious Transfer” to perform oblivious transfer on committed bits: suppose Alice is committed to bits 0...
Claude Crépeau, Jeroen van de Graaf, Alain ...