Sciweavers

1449 search results - page 259 / 290
» Self-Randomized Exponentiation Algorithms
Sort
View
119
Voted
FC
2009
Springer
118views Cryptology» more  FC 2009»
15 years 9 months ago
Cryptographic Combinatorial Clock-Proxy Auctions
We present a cryptographic protocol for conducting efficient, provably correct and secrecy-preserving combinatorial clock-proxy auctions. The “clock phase” functions as a trust...
David C. Parkes, Michael O. Rabin, Christopher Tho...
FSTTCS
2009
Springer
15 years 9 months ago
Modelchecking counting properties of 1-safe nets with buffers in paraPSPACE
ABSTRACT. We consider concurrent systems that can be modelled as 1-safe Petri nets communicating through a fixed set of buffers (modelled as unbounded places). We identify a param...
M. Praveen, Kamal Lodaya
PKDD
2009
Springer
102views Data Mining» more  PKDD 2009»
15 years 9 months ago
Relevance Grounding for Planning in Relational Domains
Probabilistic relational models are an efficient way to learn and represent the dynamics in realistic environments consisting of many objects. Autonomous intelligent agents that gr...
Tobias Lang, Marc Toussaint
140
Voted
SAT
2009
Springer
91views Hardware» more  SAT 2009»
15 years 9 months ago
VARSAT: Integrating Novel Probabilistic Inference Techniques with DPLL Search
Probabilistic inference techniques can be used to estimate variable bias, or the proportion of solutions to a given SAT problem that fix a variable positively or negatively. Metho...
Eric I. Hsu, Sheila A. McIlraith
110
Voted
MM
2009
ACM
230views Multimedia» more  MM 2009»
15 years 9 months ago
Query expansion for hash-based image object retrieval
An efficient indexing method is essential for content-based image retrieval with the exponential growth in large-scale videos and photos. Recently, hash-based methods (e.g., local...
Yin-Hsi Kuo, Kuan-Ting Chen, Chien-Hsing Chiang, W...