Sciweavers

253 search results - page 43 / 51
» Conditional Symmetry Breaking
Sort
View
IAT
2008
IEEE
15 years 4 months ago
Beyond Quasi-linear Utility: Strategy/False-Name-Proof Multi-unit Auction Protocols
We develop strategy/false-name-proof multi-unit auction protocols for non-quasi-linear utilities. One almost universal assumption in auction theory literature is that each bidder ...
Yuko Sakurai, Yasumasa Saito, Atsushi Iwasaki, Mak...
CSFW
2007
IEEE
15 years 4 months ago
Probability of Error in Information-Hiding Protocols
Randomized protocols for hiding private information can often be regarded as noisy channels in the informationtheoretic sense, and the inference of the concealed information can b...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
ICRA
2006
IEEE
92views Robotics» more  ICRA 2006»
15 years 3 months ago
Modeling of the Supporting Legs for Designing Biomimetic Water Strider Robots
— Recent studies on the insect water strider showed that the insect heavily relies on surface tension force to stay afloat. Inspired by this insect, water strider robots have be...
Yun Seong Song, Steve H. Suhr, Metin Sitti
ICCV
2005
IEEE
15 years 3 months ago
Resolving Hand over Face Occlusion
Abstract. This paper presents a method to segment the hand over complex backgrounds, such as the face. The similar colors and texture of the hand and face make the problem particul...
Paul Smith, Niels da Vitoria Lobo, Mubarak Shah
EUROCRYPT
2004
Springer
15 years 3 months ago
Multi-party Computation with Hybrid Security
It is well-known that n players connected only by pairwise secure channels can achieve multi-party computation secure against an active adversary if and only if – t < n/2 of t...
Matthias Fitzi, Thomas Holenstein, Jürg Wulls...