Abstract. In this paper we consider commitment schemes that are secure against concurrent man-in-the-middle (cMiM) attacks. Under such attacks, two possible notions of security for...
Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
We introduce a new approach to constrained Independent Component Analysis (ICA) by formulating the original, unconstrained ICA problem as well as the constraints in mutual informa...
to appear in Proc. IEEE International Conference on Computer Vision (ICCV), 2005 Bayesian methods have been extensively used in various applications. However, there are two intrin...
Yunqiang Chen, Hongcheng Wang, Tong Fang, Jason Ty...
Abstract. Existing computer science approaches to business modeling offer lowstractions such as data and control flows, which fail to capture the business intent underlying the in...
Independent Subspace Analysis (ISA) is a generalization of ICA. It tries to find a basis in which a given random vector can be decomposed into groups of mutually independent rando...