Sciweavers

1219 search results - page 67 / 244
» Where to Look Next
Sort
View
CRYPTO
2011
Springer
180views Cryptology» more  CRYPTO 2011»
12 years 9 months ago
Leakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
Sanjam Garg, Abhishek Jain 0002, Amit Sahai
ICIP
2003
IEEE
14 years 11 months ago
A probabilistic framework for image segmentation
A new probabilistic image segmentation model based on hypothesis testing and Gibbs Random Fields is introduced. First, a probabilistic difference measure derived from a set of hyp...
Slawo Wesolkowski, Paul W. Fieguth
ALT
2009
Springer
14 years 6 months ago
Learning Unknown Graphs
Motivated by a problem of targeted advertising in social networks, we introduce and study a new model of online learning on labeled graphs where the graph is initially unknown and...
Nicolò Cesa-Bianchi, Claudio Gentile, Fabio...
ICCD
2002
IEEE
115views Hardware» more  ICCD 2002»
14 years 6 months ago
Low-Power, High-Speed CMOS VLSI Design
Ubiquitous computing is a next generation information technology where computers and communications will be scaled further, merged together, and materialized in consumer applicati...
Tadahiro Kuroda
GLOBECOM
2008
IEEE
14 years 4 months ago
Game Theoretic Rate Adaptation for Spectrum-Overlay Cognitive Radio Networks
— We consider the issue of fair share of the spectrum opportunity for the case of spectrum-overlay cognitive radio networks. Owing to the decentralized nature of the network, we ...
Laxminarayana S. Pillutla, Vikram Krishnamurthy