Sciweavers

79 search results - page 13 / 16
» Piercing random boxes
Sort
View
ACNS
2004
Springer
131views Cryptology» more  ACNS 2004»
14 years 6 days ago
Evaluating Security of Voting Schemes in the Universal Composability Framework
In the literature, voting protocols are considered secure if they satisfy requirements such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting pr...
Jens Groth
FOCS
2004
IEEE
14 years 5 days ago
Stochastic Optimization is (Almost) as easy as Deterministic Optimization
Stochastic optimization problems attempt to model uncertainty in the data by assuming that (part of) the input is specified in terms of a probability distribution. We consider the...
David B. Shmoys, Chaitanya Swamy
CSDA
2006
71views more  CSDA 2006»
13 years 8 months ago
Practical representations of incomplete probabilistic knowledge
This article deals with the compact representation of incomplete probabilistic knowledge which can be encountered in risk evaluation problems, for instance in environmental studie...
Cédric Baudrit, Didier Dubois
IVC
2008
138views more  IVC 2008»
13 years 8 months ago
Reconstructing relief surfaces
This paper generalizes Markov Random Field (MRF) stereo methods to the generation of surface relief (height) fields rather than disparity or depth maps. This generalization enable...
George Vogiatzis, Philip H. S. Torr, Steven M. Sei...
CG
2002
Springer
13 years 8 months ago
Investigation of an Adaptive Cribbage Player
Cribbage is (normally) a two-player card game where the aim is to score 121 points before your opponent. The game has four stages, one of which involves discarding two cards from t...
Graham Kendall, Stephen Shaw