Sciweavers

876 search results - page 138 / 176
» Limits on the Usefulness of Random Oracles
Sort
View
137
Voted
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
14 years 18 days ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters
102
Voted
BMCBI
2007
97views more  BMCBI 2007»
15 years 27 days ago
Relating destabilizing regions to known functional sites in proteins
Background: Most methods for predicting functional sites in protein 3D structures, rely on information on related proteins and cannot be applied to proteins with no known relative...
Benoit H. Dessailly, Marc F. Lensink, Shoshana J. ...
113
Voted
CVPR
2010
IEEE
15 years 9 months ago
A Generative Perspective on MRFs in Low-Level Vision
Markov random fields (MRFs) are popular and generic probabilistic models of prior knowledge in low-level vision. Yet their generative properties are rarely examined, while applica...
Uwe Schmidt, Qi Gao, Stefan Roth
105
Voted
IROS
2008
IEEE
138views Robotics» more  IROS 2008»
15 years 7 months ago
Blended local planning for generating safe and feasible paths
Abstract— Many planning approaches adhere to the twotiered architecture consisting of a long-range, low fidelity global planner and a short-range high fidelity local planner. W...
Ling Xu, Anthony Stentz
104
Voted
INFOCOM
2007
IEEE
15 years 7 months ago
On Node Isolation Under Churn in Unstructured P2P Networks with Heavy-Tailed Lifetimes
— Previous analytical studies [12], [18] of unstructured P2P resilience have assumed exponential user lifetimes and only considered age-independent neighbor replacement. In this ...
Zhongmei Yao, Xiaoming Wang, Derek Leonard, Dmitri...