Sciweavers

2061 search results - page 370 / 413
» Authorization for Metacomputing Applications
Sort
View
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay
93
Voted
ECML
2005
Springer
15 years 6 months ago
Nonrigid Embeddings for Dimensionality Reduction
Spectral methods for embedding graphs and immersing data manifolds in low-dimensional speaces are notoriously unstable due to insufficient and/or numberically ill-conditioned con...
Matthew Brand
109
Voted
ICCS
2005
Springer
15 years 6 months ago
The Dynamics of Computing Agent Systems
The paper presents the Multi Agent System (MAS) designed for the large scale parallel computations. The special kind of diffusionbased scheduling enables to decompose and allocate...
Maciej Smolka, Piotr Uhruski, Robert Schaefer, Mar...
RT
2005
Springer
15 years 6 months ago
Estimation of 3D Faces and Illumination from Single Photographs Using A Bilinear Illumination Model
3D Face modeling is still one of the biggest challenges in computer graphics. In this paper we present a novel framework that acquires the 3D shape, texture, pose and illumination...
Jinho Lee, Hanspeter Pfister, Baback Moghaddam, Ra...
WINE
2005
Springer
161views Economy» more  WINE 2005»
15 years 6 months ago
Design of Incentive Compatible Mechanisms for Stackelberg Problems
This paper takes the first steps towards designing incentive compatible mechanisms for hierarchical decision making problems involving selfish agents. We call these Stackelberg p...
Dinesh Garg, Yadati Narahari