Sciweavers

471 search results - page 76 / 95
» Social applications: exploring a more secure framework
Sort
View
CRYPTO
2008
Springer
98views Cryptology» more  CRYPTO 2008»
13 years 10 months ago
One-Time Programs
Abstract. In this work, we introduce one-time programs, a new computational paradigm geared towards security applications. A one-time program can be executed on a single input, who...
Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothbl...
ICCV
2009
IEEE
13 years 6 months ago
Efficient human pose estimation via parsing a tree structure based human model
Human pose estimation is the task of determining the states (location, orientation and scale) of each body part. It is important for many vision understanding applications, e.g. v...
Xiaoqin Zhang, Changcheng Li, Xiaofeng Tong, Weimi...
ISCA
2008
IEEE
205views Hardware» more  ISCA 2008»
14 years 3 months ago
VEAL: Virtualized Execution Accelerator for Loops
Performance improvement solely through transistor scaling is becoming more and more difficult, thus it is increasingly common to see domain specific accelerators used in conjunc...
Nathan Clark, Amir Hormati, Scott A. Mahlke
RIVF
2007
13 years 10 months ago
Stochastic routing in large grid-shaped quantum networks
— This paper investigates the problem of secret key transmissions for an arbitrary Alice-Bob pair in Quantum Key Distribution (QKD)-based networks. We develop a realistic QKDbase...
Cuong Le Quoc, Patrick Bellot, Akim Demaille
AGENTS
2000
Springer
14 years 1 months ago
Agent communication transfer protocol
Conversations involving three or more agents often occur in multi-agent systems, for example in brokering and auction protocols typically used in e-commerce. For developing agents ...
Alexander Artikis, Jeremy Pitt, Christos Stergiou