Sciweavers

430 search results - page 65 / 86
» Efficient Proving for Practical Distributed Access-Control S...
Sort
View
ICASSP
2011
IEEE
14 years 3 months ago
Exploiting an interplay between norms to analyze scalar quantization schemes
Quantization is intrinsic to several data acquisition systems. This process is especially important in distributed settings, where observations must rst be compressed before they ...
Parimal Parag, Jean-François Chamberland
UAI
2008
15 years 1 months ago
Dyna-Style Planning with Linear Function Approximation and Prioritized Sweeping
We consider the problem of efficiently learning optimal control policies and value functions over large state spaces in an online setting in which estimates must be available afte...
Richard S. Sutton, Csaba Szepesvári, Alborz...
ICPADS
2005
IEEE
15 years 5 months ago
An Adaptive Multiparty Protocol for Secure Data Protection
To better protect information systems, computation time data protection needs to be considered such that even when the system is partially compromised, the security of the system ...
Qingkai Ma, Liangliang Xiao, I-Ling Yen, Manghui T...
SSS
2009
Springer
195views Control Systems» more  SSS 2009»
15 years 6 months ago
Anonymous Transactions in Computer Networks
Abstract. We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as...
Shlomi Dolev, Marina Kopeetsky
90
Voted
VTC
2007
IEEE
112views Communications» more  VTC 2007»
15 years 6 months ago
Unequal Importance Image Communication over Heterogeneous Networks
An unequal importance communication approach, for reliable and real-time image communication over heterogeneous networks and its applications in mobile communication systems is pre...
Mehdi Malboubi, Ahmad Bahai, Mustafa Ergen, Pravin...