Sciweavers

2863 search results - page 83 / 573
» Constructing minimum-interference networks
Sort
View
ICB
2009
Springer
156views Biometrics» more  ICB 2009»
14 years 11 months ago
Bipartite Biotokens: Definition, Implementation, and Analysis
Abstract. Cryptographic transactions form the basis of many common security systems found throughout computer networks. Supporting these transactions with biometrics is very desira...
Walter J. Scheirer, Terrance E. Boult
IACR
2011
124views more  IACR 2011»
14 years 1 months ago
Generic Fully Simulatable Adaptive Oblivious Transfer
We aim at constructing adaptive oblivious transfer protocols, enjoying fully simulatable security, from various well-known assumptions such as DDH, d-Linear, QR, DCR, and LWE. To t...
Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
PODC
1987
ACM
15 years 5 months ago
Hierarchical Correctness Proofs for Distributed Algorithms
Abstract: We introduce the input-output automaton, a simple but powerful model of computation in asynchronous distributed networks. With this model we are able to construct modular...
Nancy A. Lynch, Mark R. Tuttle
COLING
1990
15 years 2 months ago
Language Without A Central Pushdown Stack
We will attempt to show how human performance limitations on various types of syntactic embedding constructions in Germanic languages can be modelled in a relational network lingu...
Carson T. Schütze, Peter A. Reich
IJON
2008
118views more  IJON 2008»
15 years 1 months ago
Incremental extreme learning machine with fully complex hidden nodes
Huang et al. [Universal approximation using incremental constructive feedforward networks with random hidden nodes, IEEE Trans. Neural Networks 17(4) (2006) 879
Guang-Bin Huang, Ming-Bin Li, Lei Chen, Chee Kheon...