Sciweavers

198 search results - page 15 / 40
» Weak Probabilistic Anonymity
Sort
View
VMCAI
2012
Springer
12 years 4 months ago
A General Framework for Probabilistic Characterizing Formulae
Abstract. Recently, a general framework on characteristic formulae was proposed by Aceto et al. It offers a simple theory that allows one to easily obtain characteristic formulae o...
Joshua Sack, Lijun Zhang
QEST
2005
IEEE
14 years 2 months ago
Comparative Analysis of Bisimulation Relations on Alternating and Non-Alternating Probabilistic Models
We consider bisimulation and weak bisimulation relations in the context of the Labeled Markov Chains of Hansson and Jonsson, the Concurrent Labeled Markov Chains of Philippou, Lee...
Roberto Segala, Andrea Turrini
ICPR
2008
IEEE
14 years 10 months ago
Weakly supervised learning using proportion-based information: An application to fisheries acoustics
This paper addresses the inference of probabilistic classification models using weakly supervised learning. In contrast to previous work, the use of proportion-based training data...
Carla Scalarin, Jacques Masse, Jean-Marc Boucher, ...
TCC
2007
Springer
86views Cryptology» more  TCC 2007»
14 years 3 months ago
Weakly-Private Secret Sharing Schemes
Abstract. Secret-sharing schemes are an important tool in cryptography that is used in the construction of many secure protocols. However, the shares’ size in the best known secr...
Amos Beimel, Matthew K. Franklin
FC
2008
Springer
90views Cryptology» more  FC 2008»
13 years 11 months ago
Practical Anonymous Divisible E-Cash from Bounded Accumulators
We present an efficient off-line divisible e-cash scheme which is truly anonymous without a trusted third party. This is the second scheme in the literature which achieves full unl...
Man Ho Au, Willy Susilo, Yi Mu