Sciweavers

2661 search results - page 464 / 533
» Model Checking Performability Properties
Sort
View
JMLR
2008
129views more  JMLR 2008»
15 years 2 months ago
Finite-Time Bounds for Fitted Value Iteration
In this paper we develop a theoretical analysis of the performance of sampling-based fitted value iteration (FVI) to solve infinite state-space, discounted-reward Markovian decisi...
Rémi Munos, Csaba Szepesvári
119
Voted
ACISP
2009
Springer
15 years 9 months ago
Building Key-Private Public-Key Encryption Schemes
In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts correspondi...
Kenneth G. Paterson, Sriramkrishnan Srinivasan
125
Voted
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
15 years 6 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
WSC
2004
15 years 3 months ago
Implementing the High Level Architecture in the Virtual Test Bed
The Virtual Test Bed (VTB) is a prototype of a virtual engineering environment to study operations of current and future space vehicles, spaceports, and ranges. The HighLevel Arch...
José A. Sepúlveda, Luis C. Rabelo, J...
SIGPRO
2010
103views more  SIGPRO 2010»
15 years 22 days ago
Optimal design of high-performance separable wavelet filter banks for image coding
An optimization-based method is proposed for the design of high-performance separable wavelet filter banks for image coding. This method yields linear-phase perfect-reconstructio...
Michael D. Adams, Di Xu