Sciweavers

493 search results - page 32 / 99
» The oracle penalty method
Sort
View
EUROCRYPT
2007
Springer
14 years 3 months ago
General Ad Hoc Encryption from Exponent Inversion IBE
Among the three broad classes of Identity-Based Encryption schemes built from pairings, the exponent inversion paradigm tends to be the most efficient, but also the least extensibl...
Xavier Boyen
FOCS
2006
IEEE
14 years 3 months ago
Heat Flow and a Faster Algorithm to Compute the Surface Area of a Convex Body
We draw on the observation that the amount of heat diffusing outside of a heated body in a short period of time is proportional to its surface area, to design a simple algorithm f...
Mikhail Belkin, Hariharan Narayanan, Partha Niyogi
CRYPTO
2000
Springer
133views Cryptology» more  CRYPTO 2000»
14 years 1 months ago
Provably Secure Partially Blind Signatures
Partially blind signature schemes are an extension of blind signature schemes that allow a signer to explicitly include necessary information (expiration date, collateral condition...
Masayuki Abe, Tatsuaki Okamoto
VMV
2004
103views Visualization» more  VMV 2004»
13 years 10 months ago
Consistent penetration depth estimation for deformable collision response
Penalty approaches can be used to efficiently resolve collisions of dynamically simulated rigid and deformable objects. These methods compute penalty forces based on the penetrati...
Bruno Heidelberger, Matthias Teschner, Richard Kei...
ICML
2010
IEEE
13 years 10 months ago
Tree-Guided Group Lasso for Multi-Task Regression with Structured Sparsity
We consider the problem of learning a sparse multi-task regression, where the structure in the outputs can be represented as a tree with leaf nodes as outputs and internal nodes a...
Seyoung Kim, Eric P. Xing