Sciweavers

423 search results - page 16 / 85
» ideal 2007
Sort
View
TCC
2007
Springer
89views Cryptology» more  TCC 2007»
14 years 1 months ago
On Secret Sharing Schemes, Matroids and Polymatroids
Abstract. One of the main open problems in secret sharing is the characterization of the access structures of ideal secret sharing schemes. As a consequence of the results by Brick...
Jaume Martí-Farré, Carles Padr&oacut...
28
Voted
IANDC
2007
152views more  IANDC 2007»
13 years 7 months ago
The reactive simulatability (RSIM) framework for asynchronous systems
We define reactive simulatability for general asynchronous systems. Roughly, simulatability means that a real system implements an ideal system (specification) in a way that pre...
Michael Backes, Birgit Pfitzmann, Michael Waidner
IPPS
2007
IEEE
14 years 1 months ago
Performance Modelling of Peer-to-Peer Routing
We propose several models based on discrete-time Markov chains for the analysis of Distributed Hash Tables (DHTs). Specifically, we examine the Pastry routing protocol, as well a...
Idris A. Rai, Andrew Brampton, Andrew MacQuire, La...
IDEAL
2007
Springer
14 years 1 months ago
Skill Combination for Reinforcement Learning
Recently researchers have introduced methods to develop reusable knowledge in reinforcement learning (RL). In this paper, we define simple principles to combine skills in reinforce...
Zhihui Luo, David A. Bell, Barry McCollum
IDEAL
2007
Springer
14 years 1 months ago
Influence of Wavelet Frequency and Orientation in an SVM-Based Parallel Gabor PCA Face Verification System
We present a face verification system using Parallel Gabor Principal Component Analysis (PGPCA) and fusion of Support Vector Machines (SVM) scores. The algorithm has been tested on...
Ángel Serrano, Isaac Martín de Diego...