Many agents are fielded within environments requiring modeling traditional organizational structures such as military hierarchies and corporations, with their associated authority...
Marcus J. Huber, Sanjeev Kumar, David McGee, Sean ...
In this paper an efficient method of small object localization is proposed that integrates detection and tracking. The system is initialized using a strong detector and then it lo...
Secure data sharing in multi-party environments requires that both authenticity and confidentiality of the data be assured. Digital signature schemes are commonly employed for au...
We investigate the influence of information status (IS) on constituent order in German, and integrate our findings into a loglinear surface realisation ranking model. We show that...
Abstract. Protocols for deniable authentication achieve seemingly paradoxical guarantees: upon completion of the protocol the receiver is convinced that the sender authenticated th...
Yevgeniy Dodis, Jonathan Katz, Adam Smith, Shabsi ...