Sciweavers

400 search results - page 29 / 80
» Hard Problem Generation for MKP
Sort
View
124
Voted
INFOCOM
2011
IEEE
14 years 4 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
ML
2000
ACM
103views Machine Learning» more  ML 2000»
15 years 14 days ago
Phase Transitions in Relational Learning
One of the major limitations of relational learning is due to the complexity of verifying hypotheses on examples. In this paper we investigate this task in light of recent publishe...
Attilio Giordana, Lorenza Saitta
108
Voted
KBSE
2007
IEEE
15 years 7 months ago
An automated approach to monitoring and diagnosing requirements
Monitoring the satisfaction of software requirements and diagnosing what went wrong in case of failure is a hard problem that has received little attention in the Software and Req...
Yiqiao Wang, Sheila A. McIlraith, Yijun Yu, John M...
ICRA
2008
IEEE
134views Robotics» more  ICRA 2008»
15 years 7 months ago
Real-time learning of resolved velocity control on a Mitsubishi PA-10
Abstract— Learning inverse kinematics has long been fascinating the robot learning community. While humans acquire this transformation to complicated tool spaces with ease, it is...
Jan Peters, Duy Nguyen-Tuong
103
Voted
TCC
2010
Springer
163views Cryptology» more  TCC 2010»
15 years 7 months ago
Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs
Introduced by Micali, Rabin and Kilian (MRK), the basic primitive of zero-knowledge sets (ZKS) allows a prover to commit to a secret set S so as to be able to prove statements such...
Benoît Libert, Moti Yung