Sciweavers

29918 search results - page 5858 / 5984
» A computational model of belief
Sort
View
EUROCRYPT
2007
Springer
15 years 4 months ago
Atomic Secure Multi-party Multiplication with Low Communication
We consider the standard secure multi-party multiplication protocol due to M. Rabin. This protocol is based on Shamir’s secret sharing scheme and it can be viewed as a practical ...
Ronald Cramer, Ivan Damgård, Robbert de Haan
FC
2007
Springer
158views Cryptology» more  FC 2007»
15 years 4 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou
CVPR
2009
IEEE
15 years 4 months ago
Recovering Specular Surfaces Using Curved Line Images
We present a new shape-from-distortion framework for recovering specular (reflective/refractive) surfaces. While most existing approaches rely on accurate correspondences between 2...
Yuanyuan Ding, Jingyi Yu, Peter Sturm
GECCO
2007
Springer
178views Optimization» more  GECCO 2007»
15 years 4 months ago
Coevolution of intelligent agents using cartesian genetic programming
A coevolutionary competitive learning environment for two antagonistic agents is presented. The agents are controlled by a new kind of computational network based on a compartment...
Gul Muhammad Khan, Julian Francis Miller, David M....
HM
2007
Springer
137views Optimization» more  HM 2007»
15 years 4 months ago
A Hybrid VNS for Connected Facility Location
The connected facility location (ConFL) problem generalizes the facility location problem and the Steiner tree problem in graphs. Given a graph G = (V, E), a set of customers D ⊆...
Ivana Ljubic
« Prev « First page 5858 / 5984 Last » Next »