Sciweavers

273 search results - page 43 / 55
» Mutually Independent Commitments
Sort
View
EUROCRYPT
2000
Springer
13 years 11 months ago
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
Abstract. When designing password-authenticated key exchange protocols (as opposed to key exchange protocols authenticated using cryptographically secure keys), one must not allow ...
Victor Boyko, Philip D. MacKenzie, Sarvar Patel
ATAL
2008
Springer
13 years 9 months ago
A cooperation-based approach for evolution of service ontologies
Communication among agents requires a common vocabulary to facilitate successful information exchange. One way to achieve this is to assume the existence of a common ontology amon...
Murat Sensoy, Pinar Yolum
NIPS
2007
13 years 8 months ago
Discovering Weakly-Interacting Factors in a Complex Stochastic Process
Dynamic Bayesian networks are structured representations of stochastic processes. Despite their structure, exact inference in DBNs is generally intractable. One approach to approx...
Charlie Frogner, Avi Pfeffer
ESANN
2006
13 years 8 months ago
Hierarchical markovian models for joint classification, segmentation and data reduction of hyperspectral images
Spectral classification, segmentation and data reduction are the three main problems in hyperspectral image analysis. In this paper we propose a Bayesian estimation approach which ...
Nadia Bali, Ali Mohammad-Djafari, Adel Mohammadpou...
GECCO
2008
Springer
119views Optimization» more  GECCO 2008»
13 years 8 months ago
GP age-layer and crossover effects in bid-offer spread prediction
The bid-offer spread on equity options is a key source of profits for market makers, and a key cost for those trading in the options. Spreads are influenced by dynamic market f...
Amy Willis, Suneer Patel, Christopher D. Clack