Sciweavers

46 search results - page 9 / 10
» Breaking All Value Symmetries in Surjection Problems
Sort
View
FCS
2006
13 years 7 months ago
Principles of Optimal Probabilistic Decision Tree Construction
Probabilistic (or randomized) decision trees can be used to compute Boolean functions. We consider two types of probabilistic decision trees - one has a certain probability to give...
Laura Mancinska, Maris Ozols, Ilze Dzelme-Berzina,...
CSFW
2007
IEEE
14 years 18 days ago
Probability of Error in Information-Hiding Protocols
Randomized protocols for hiding private information can often be regarded as noisy channels in the informationtheoretic sense, and the inference of the concealed information can b...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
ICCV
2005
IEEE
13 years 12 months ago
Resolving Hand over Face Occlusion
Abstract. This paper presents a method to segment the hand over complex backgrounds, such as the face. The similar colors and texture of the hand and face make the problem particul...
Paul Smith, Niels da Vitoria Lobo, Mubarak Shah
JCS
2008
93views more  JCS 2008»
13 years 6 months ago
On the Bayes risk in information-hiding protocols
Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be reg...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
COMPSEC
2010
146views more  COMPSEC 2010»
13 years 6 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...