Sciweavers

2027 search results - page 397 / 406
» When is it best to best-respond
Sort
View
PAIRING
2010
Springer
155views Cryptology» more  PAIRING 2010»
13 years 7 months ago
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches
Abstract. This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The me...
Brian J. Matt
SECON
2010
IEEE
13 years 7 months ago
SAND: Sectored-Antenna Neighbor Discovery Protocol for Wireless Networks
Abstract--Directional antennas offer many potential advantages for wireless networks such as increased network capacity, extended transmission range and reduced energy consumption....
Emad Felemban, Robert Murawski, Eylem Ekici, Sangj...
ICCV
2009
IEEE
13 years 7 months ago
BLOGS: Balanced local and global search for non-degenerate two view epipolar geometry
This work considers the problem of estimating the epipolar geometry between two cameras without needing a prespecified set of correspondences. It is capable of resolving the epipo...
Aveek S. Brahmachari, Sudeep Sarkar
ICWSM
2009
13 years 7 months ago
MakeMyPage: Social Media Meets Automatic Content Generation
Finding out about a topic online can be time consuming. It involves visiting multiple news sites, encyclopedia entries, video repositories and other resources while discarding irr...
Francisco Iacobelli, Kristian J. Hammond, Larry Bi...
ECCC
2010
98views more  ECCC 2010»
13 years 7 months ago
Efficient Semantic Communication via Compatible Beliefs
In previous works, Juba and Sudan [6] and Goldreich, Juba and Sudan [4] considered the idea of "semantic communication", wherein two players, a user and a server, attemp...
Brendan Juba, Madhu Sudan