Sciweavers

8903 search results - page 1770 / 1781
» Alternative
Sort
View
IACR
2011
89views more  IACR 2011»
13 years 11 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown
IACR
2011
125views more  IACR 2011»
13 years 11 months ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...
AAMAS
2012
Springer
13 years 7 months ago
Using argumentation to model agent decision making in economic experiments
In this paper we demonstrate how a qualitative framework for decision making can be used to model scenarios from experimental economic studies and we show how our approach explains...
Trevor J. M. Bench-Capon, Katie Atkinson, Peter Mc...
CODASPY
2012
13 years 7 months ago
Detecting repackaged smartphone applications in third-party android marketplaces
Recent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone ...
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning
CORR
2012
Springer
193views Education» more  CORR 2012»
13 years 7 months ago
A Unifying Framework for Linearly Solvable Control
Recent work has led to the development of an elegant theory of Linearly Solvable Markov Decision Processes (LMDPs) and related Path-Integral Control Problems. Traditionally, LMDPs...
Krishnamurthy Dvijotham, Emanuel Todorov
« Prev « First page 1770 / 1781 Last » Next »