Sciweavers

2059 search results - page 32 / 412
» A Directed Threshold - Signature Scheme
Sort
View
NECO
2006
157views more  NECO 2006»
15 years 5 months ago
Experiments with AdaBoost.RT, an Improved Boosting Scheme for Regression
The application of boosting technique to the regression problems has received relatively little attention in contrast to the research aimed at classification problems. This paper ...
Durga L. Shrestha, Dimitri P. Solomatine
SIPS
2007
IEEE
15 years 11 months ago
A New Video Compression Scheme Combining Conditional Replenishment and Address Event Representation
A novel video compression scheme is presented in this paper. This algorithm is implemented based on a conditional replenishment Address Event Representation (AER) imager, where im...
Harry. L. Hu, Amine Bermak, Dominique Martinez
TCC
2010
Springer
176views Cryptology» more  TCC 2010»
16 years 2 months ago
Ideal Hierarchical Secret Sharing Schemes
The search of efficient constructions of ideal secret sharing schemes for families of nonthreshold access structures that may have useful applications has attracted a lot of atten...
Oriol Farràs, Carles Padró
JCP
2008
216views more  JCP 2008»
15 years 5 months ago
Direct Anonymous Attestation for Next Generation TPM
Trusted computing platforms have been proposed as a promising approach to enhance the security of general-purpose computing systems. Direct Anonymous Attestation(DAA) is a scheme t...
Xiaofeng Chen 0004, Dengguo Feng
APPROX
2010
Springer
213views Algorithms» more  APPROX 2010»
15 years 7 months ago
Constructive Proofs of Concentration Bounds
We give a simple combinatorial proof of the Chernoff-Hoeffding concentration bound [Che52, Hoe63], which says that the sum of independent {0, 1}-valued random variables is highly ...
Russell Impagliazzo, Valentine Kabanets