Sciweavers

6833 search results - page 137 / 1367
» Some two-character sets
Sort
View
CTRSA
2008
Springer
197views Cryptology» more  CTRSA 2008»
15 years 6 months ago
Legally-Enforceable Fairness in Secure Two-Party Computation
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computation should...
Andrew Y. Lindell
AAAI
2006
15 years 5 months ago
A Characterization of Interventional Distributions in Semi-Markovian Causal Models
We offer a complete characterization of the set of distributions that could be induced by local interventions on variables governed by a causal Bayesian network of unknown structu...
Jin Tian, Changsung Kang, Judea Pearl
DICTA
2003
15 years 5 months ago
Face Recognition: A Comparison of Appearance-Based Approaches
  We  investigate  the  effect  of  image  processing  techniques  when  applied as a pre-processing step to three methods of face recognition: the direct  c...
Thomas Heseltine, Nick Pears, Jim Austin, Zezhi Ch...
121
Voted
DLT
2003
15 years 5 months ago
On a Conjecture of Schnoebelen
The notion of sequential and parallel decomposition of a language over a set of languages was introduced by Schnoebelen. A language is decomposable if it belongs to a finite set ...
Antonio Cano Gómez, Jean-Eric Pin
AML
2010
98views more  AML 2010»
15 years 4 months ago
Small universal families for graphs omitting cliques without GCH
When no single universal model for a set of structures exists at a given cardinal, then one may ask in which models of set theory does there exist a small family which embeds the r...
Katherine Thompson