Sciweavers

2181 search results - page 373 / 437
» The restriction scaffold problem
Sort
View
CRYPTO
2008
Springer
84views Cryptology» more  CRYPTO 2008»
13 years 10 months ago
Improved Bounds on Security Reductions for Discrete Log Based Signatures
Despite considerable research efforts, no efficient reduction from the discrete log problem to forging a discrete log based signature (e.g. Schnorr) is currently known. In fact, ne...
Sanjam Garg, Raghav Bhaskar, Satyanarayana V. Loka...
OPODIS
2004
13 years 10 months ago
Self-optimizing DHTs Using Request Profiling
S (in alphabetic order by speaker surname) Speaker: Uri Abraham (Ben-Gurion University) Title: Self-Stabilizing TimeStamps : Speaker: Anish Arora (Ohio State) Title: Self-Stabilizi...
Alina Bejan, Sukumar Ghosh
ESM
1998
13 years 10 months ago
On Hybrid Combination of Queueing and Simulation
This paper aims to and illustrate that simulation and queuing theory can and should go hand in hand for a variety of practical problems, both in daily-life and industry, which are...
Nico M. van Dijk
NIPS
1998
13 years 10 months ago
Risk Sensitive Reinforcement Learning
In this paper, we consider Markov Decision Processes (MDPs) with error states. Error states are those states entering which is undesirable or dangerous. We define the risk with re...
Ralph Neuneier, Oliver Mihatsch
IJCAI
1993
13 years 10 months ago
Action Representation and Purpose: Re-evaluating the Foundations of Computational Vision
The traditional goal of computer vision, to reconstruct, or recover properties of, the scene has recently been challenged by advocates of a new purposive approach in which the vis...
Michael J. Black, Yiannis Aloimonos, Christopher M...