Sciweavers

1628 search results - page 221 / 326
» Compiler Construction Using Scheme
Sort
View
ACISP
2005
Springer
15 years 8 months ago
Group Signature Where Group Manager, Members and Open Authority Are Identity-Based
We present the first group signature scheme with provable security and signature size O(λ) bits where the group manager, the group members, and the Open Authority (OA) are all id...
Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang
ECML
2003
Springer
15 years 7 months ago
Logistic Model Trees
Abstract. Tree induction methods and linear models are popular techniques for supervised learning tasks, both for the prediction of nominal classes and continuous numeric values. F...
Niels Landwehr, Mark Hall, Eibe Frank
113
Voted
SPW
2004
Springer
15 years 8 months ago
The Dancing Bear: A New Way of Composing Ciphers
This note presents a new way of composing cryptographic primitives which makes some novel combinations possible. For example, one can do threshold decryption using standard block c...
Ross Anderson
145
Voted
CVPR
2008
IEEE
16 years 4 months ago
Interactive image segmentation via minimization of quadratic energies on directed graphs
We propose a scheme to introduce directionality in the Random Walker algorithm for image segmentation. In particular, we extend the optimization framework of this algorithm to com...
Dheeraj Singaraju, Leo Grady, René Vidal
148
Voted
WD
2010
15 years 15 days ago
Vicinity resource cartography for delay-tolerant networks: A holistic perspective
In this paper we propose a distributed approach to construct vicinity resource maps at each node in a delaytolerant network. The scheme uses recent encounters to estimate the avail...
Gabriel Sandulescu, Péter Schaffer, Simin N...