Sciweavers

1219 search results - page 67 / 244
» Where to Look Next
Sort
View
CRYPTO
2011
Springer
180views Cryptology» more  CRYPTO 2011»
14 years 4 months ago
Leakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
Sanjam Garg, Abhishek Jain 0002, Amit Sahai
ICIP
2003
IEEE
16 years 5 months ago
A probabilistic framework for image segmentation
A new probabilistic image segmentation model based on hypothesis testing and Gibbs Random Fields is introduced. First, a probabilistic difference measure derived from a set of hyp...
Slawo Wesolkowski, Paul W. Fieguth
116
Voted
ALT
2009
Springer
16 years 1 months ago
Learning Unknown Graphs
Motivated by a problem of targeted advertising in social networks, we introduce and study a new model of online learning on labeled graphs where the graph is initially unknown and...
Nicolò Cesa-Bianchi, Claudio Gentile, Fabio...
ICCD
2002
IEEE
115views Hardware» more  ICCD 2002»
16 years 1 months ago
Low-Power, High-Speed CMOS VLSI Design
Ubiquitous computing is a next generation information technology where computers and communications will be scaled further, merged together, and materialized in consumer applicati...
Tadahiro Kuroda
GLOBECOM
2008
IEEE
15 years 10 months ago
Game Theoretic Rate Adaptation for Spectrum-Overlay Cognitive Radio Networks
— We consider the issue of fair share of the spectrum opportunity for the case of spectrum-overlay cognitive radio networks. Owing to the decentralized nature of the network, we ...
Laxminarayana S. Pillutla, Vikram Krishnamurthy