Sciweavers

5244 search results - page 24 / 1049
» When are two algorithms the same
Sort
View
CTRSA
2005
Springer
72views Cryptology» more  CTRSA 2005»
14 years 1 months ago
Proofs for Two-Server Password Authentication
Traditional password-based authentication and key-exchange protocols suffer from the simple fact that a single server stores the sensitive user password. In practice, when such a ...
Michael Szydlo, Burton S. Kaliski Jr.
PAMI
2006
119views more  PAMI 2006»
13 years 7 months ago
Recovering Articulated Pose: A Comparison of Two Pre and Postimposed Constraint Methods
We contrast the performance of two methods of imposing constraints during the tracking of articulated objects, the first method preimposing the kinematic constraints during trackin...
Teófilo Emídio de Campos, Ben Tordof...
FOIKS
2010
Springer
13 years 5 months ago
Two Complementary Classification Methods for Designing a Concept Lattice from Interval Data
This paper holds on the application of two classification methods based on formal concept analysis (FCA) to interval data. The first method uses a similarity between objects while ...
Mehdi Kaytoue-Uberall, Zainab Assaghir, Nizar Mess...
ECAI
2008
Springer
13 years 9 months ago
A Truthful Two-Stage Mechanism for Eliciting Probabilistic Estimates with Unknown Costs
This paper reports on the design of a novel two-stage mechanism, based on strictly proper scoring rules, that motivates selfish rational agents to make a costly probabilistic estim...
Athanasios Papakonstantinou, Alex Rogers, Enrico H...
CORR
2008
Springer
113views Education» more  CORR 2008»
13 years 7 months ago
Co-ordinate Interleaved Distributed Space-Time Coding for Two-Antenna-Relays Networks
Distributed space time coding for wireless relay networks when the source, the destination and the relays have multiple antennas have been studied by Jing and Hassibi. In this set-...
Jagadeesh Harshan, B. Sundar Rajan