Sciweavers

1615 search results - page 232 / 323
» Distributed Forward Checking
Sort
View
FLAIRS
2010
15 years 4 months ago
Learning to Identify and Track Imaginary Objects Implied by Gestures
A vision-based machine learner is presented that learns characteristic hand and object movement patterns for using certain objects, and uses this information to recreate the "...
Andreya Piplica, Alexandra Olivier, Allison Petros...
114
Voted
ATAL
2008
Springer
15 years 4 months ago
Achieving efficient and equitable collaboration among selfish agents using spender-signed currency
We study collaboration among selfish agents in the tactical airport planning domain. This can be seen as a social exchange scenario, in which the efforts of performing tasks are t...
Geert Jonker, Frank Dignum, John-Jules Ch. Meyer
117
Voted
CANS
2008
Springer
86views Cryptology» more  CANS 2008»
15 years 4 months ago
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the sa...
Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
CIA
2008
Springer
15 years 4 months ago
Filter Allocation Using Iterative ECNP
Network devices can filter traffic in order to protect end-user computers against network worms and other threats. Since these devices have very limited memories and cannot deploy ...
Jan Tozicka, Stepán Urban, Magdalena Prokop...
AMW
2010
15 years 3 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos