Sciweavers

2278 search results - page 443 / 456
» Multiple-Instance Active Learning
Sort
View
CRYPTO
2001
Springer
111views Cryptology» more  CRYPTO 2001»
14 years 3 days ago
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase
Consider a scenario where an l-bit secret has been distributed among n players by an honest dealer using some secret sharing scheme. Then, if all players behave honestly, the secre...
Ronald Cramer, Ivan Damgård, Serge Fehr
NEUROSCIENCE
2001
Springer
14 years 1 days ago
Role of the Cerebellum in Time-Critical Goal-Oriented Behaviour: Anatomical Basis and Control Principle
The Brain is a slow computer yet humans can skillfully play games such as tennis where very fast reactions are required. Of particular interest is the evidence for strategic thinki...
Guido Bugmann
IUI
2000
ACM
13 years 12 months ago
Expression constraints in multimodal human-computer interaction
Thanks to recent scientific advances, it is now possible to design multimodal interfaces allowing the use of speech and pointing out gestures on a touchscreen. However, present sp...
Sandrine Robbe-Reiter, Noelle Carbonell, Pierre Da...
ISCA
1999
IEEE
95views Hardware» more  ISCA 1999»
13 years 12 months ago
Memory Sharing Predictor: The Key to a Speculative Coherent DSM
Recent research advocates using general message predictors to learn and predict the coherence activity in distributed shared memory (DSM). By accurately predicting a message and t...
An-Chow Lai, Babak Falsafi
EUROCRYPT
1999
Springer
13 years 12 months ago
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
We consider the problem of basing Oblivious Transfer (OT) and Bit Commitment (BC), with information theoretic security, on seemingly weaker primitives. We introduce a general model...
Ivan Damgård, Joe Kilian, Louis Salvail