Sciweavers

3690 search results - page 258 / 738
» Computation with classical sequents
Sort
View
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 11 months ago
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
We enrich the classical notion of group key exchange (GKE) protocols by a new property that allows each pair of users to derive an independent peer-to-peer (p2p) key on-demand and ...
Mark Manulis
ICPR
2008
IEEE
15 years 11 months ago
Image analysis approach for identification of renal transplant rejection
Acute renal rejection is the most common reason for graft (transplanted kidney) failure after kidney transplantation, and early detection is crucial to survival of function in the...
Ayman El-Baz, Georgy L. Gimel'farb, Mohamed Abou E...
COCO
2005
Springer
110views Algorithms» more  COCO 2005»
15 years 10 months ago
Prior Entanglement, Message Compression and Privacy in Quantum Communication
Consider a two-party quantum communication protocol for computing some function f : {0, 1}n × {0, 1}n → Z. We show that the first message of P can be compressed to O(k) classi...
Rahul Jain, Jaikumar Radhakrishnan, Pranab Sen
142
Voted
FCT
2005
Springer
15 years 10 months ago
The Maximum Resource Bin Packing Problem
Usually, for bin packing problems, we try to minimize the number of bins used or in the case of the dual bin packing problem, maximize the number or total size of accepted items. ...
Joan Boyar, Leah Epstein, Lene M. Favrholdt, Jens ...
ECCV
2004
Springer
15 years 10 months ago
Statistical Learning of Evaluation Function for ASM/AAM Image Alignment
Alignment between the input and target objects has great impact on the performance of image analysis and recognition system, such as those for medical image and face recognition. A...
Xiangsheng Huang, Stan Z. Li, Yangsheng Wang