Sciweavers

2638 search results - page 373 / 528
» Random Geometric Complexes
Sort
View
ISCI
2008
160views more  ISCI 2008»
15 years 2 months ago
Certificateless undeniable signature scheme
In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based crypto...
Shanshan Duan
125
Voted
IJISEC
2006
108views more  IJISEC 2006»
15 years 2 months ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt
JSAT
2008
85views more  JSAT 2008»
15 years 2 months ago
Parallel SAT Solving using Bit-level Operations
We show how to exploit the 32/64 bit architecture of modern computers to accelerate some of the algorithms used in satisfiability solving by modifying assignments to variables in ...
Marijn Heule, Hans van Maaren
PAMI
2006
81views more  PAMI 2006»
15 years 2 months ago
Robust and Accurate Vectorization of Line Drawings
This paper presents a method for vectorizing the graphical parts of paper-based line drawings. The method consists of separating the input binary image into layers of homogeneous t...
Xavier Hilaire, Karl Tombre
TIT
2008
95views more  TIT 2008»
15 years 2 months ago
On the Delay and Throughput Gains of Coding in Unreliable Networks
In an unreliable packet network setting, we study the performance gains of optimal transmission strategies in the presence and absence of coding capability at the transmitter, wher...
Atilla Eryilmaz, Asuman E. Ozdaglar, Muriel M&eacu...