Sciweavers

915 search results - page 109 / 183
» Proof labeling schemes
Sort
View
TCC
2009
Springer
158views Cryptology» more  TCC 2009»
14 years 8 months ago
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols
The concept of witness-hiding suggested by Feige and Shamir is a natural relaxation of zero-knowledge. In this paper we identify languages and distributions for which many known co...
Iftach Haitner, Alon Rosen, Ronen Shaltiel
CVPR
2005
IEEE
14 years 10 months ago
Level Set Based Shape Prior Segmentation
We propose a level set based variational approach that incorporates shape priors into Chan-Vese's model [3] for the shape prior segmentation problem. In our model, besides th...
Tony F. Chan, Wei Zhu
MOBISYS
2003
ACM
14 years 7 months ago
An Entity Maintenance and Connection Service for Sensor Networks
In this paper, we present a middleware architecture for coordination services in sensor networks that facilitates interaction between groups of sensors which monitor different env...
Brian M. Blum, Prashant Nagaraddi, Anthony D. Wood...
FOSSACS
2005
Springer
14 years 1 months ago
Composition and Decomposition in True-Concurrency
The idea of composition and decomposition to obtain computability results is particularly relevant for true-concurrency. In contrast to the interleaving world, where composition an...
Sibylle B. Fröschle
ICCHP
2010
Springer
14 years 27 days ago
A Mobile Phone Application Enabling Visually Impaired Users to Find and Read Product Barcodes
Abstract. While there are many barcode readers available for identifying products in a supermarket or at home on mobile phones (e.g., Red Laser iPhone app), such readers are inacce...
Ender Tekin, James M. Coughlan