Sciweavers

3495 search results - page 110 / 699
» On the random satisfiable process
Sort
View
SODA
2010
ACM
214views Algorithms» more  SODA 2010»
16 years 1 months ago
Amplified Hardness of Approximation for VCG-Based Mechanisms
If a two-player social welfare maximization problem does not admit a PTAS, we prove that any maximal-in-range truthful mechanism that runs in polynomial time cannot achieve an app...
Shaddin Dughmi, Hu Fu, Robert Kleinberg
ASIACRYPT
2006
Springer
15 years 7 months ago
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
Non-interactive zero-knowledge proofs play an essential role in many cryptographic protocols. We suggest several NIZK proof systems based on prime order groups with a bilinear map...
Jens Groth
ACISP
2010
Springer
15 years 5 months ago
Attribute-Based Authenticated Key Exchange
We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-A...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
CDC
2009
IEEE
135views Control Systems» more  CDC 2009»
15 years 5 months ago
On stochastic receding horizon control with bounded control inputs
This paper is concerned with the problem of receding horizon control of discrete-time systems subject to possibly unbounded random noise inputs, while satisfying hard bounds on the...
Peter Hokayem, Debasish Chatterjee, John Lygeros
AUTOMATICA
2008
75views more  AUTOMATICA 2008»
15 years 4 months ago
Computations of probabilistic output admissible set for uncertain constrained systems
Abstract-- This paper considers uncertain constrained systems, and develops a method for computing a probabilistic output admissible (POA) set which is a set of initial states prob...
Takeshi Hatanaka, Kiyotsugu Takaba