Sciweavers

4277 search results - page 420 / 856
» On Multiple Linear Approximations
Sort
View
TC
1998
14 years 11 months ago
Resilient Authentication Using Path Independence
—Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating channels in a large distribut...
Michael K. Reiter, Stuart G. Stubblebine
ICNP
2009
IEEE
14 years 9 months ago
Achieving Efficiency and Fairness for Association Control in Vehicular Networks
Deploying city-wide 802.11 access points has made possible internet access in a vehicle, nevertheless it is challenging to maintain client performance at vehicular speed especially...
Lei Xie, Qun Li, Weizhen Mao, Jie Wu, Daoxu Chen
IPL
2011
73views more  IPL 2011»
14 years 6 months ago
Maximum subset intersection
Consider the following problem. Given n sets of sets A1, . . . , Au with elements over a universe E = {e1, . . . , en}, the goal is to select exactly one set from each of A1, . . ...
Raphaël Clifford, Alexandru Popa
IACR
2011
146views more  IACR 2011»
13 years 11 months ago
Identity-based Digital Signature Scheme Without Bilinear Pairings
: Many identity-based digital signature schemes using bilinear pairings have been proposed. But the relative computation cost of the pairing is approximately twenty times higher th...
Debiao He, Jianhua Chen, Jin Hu
CVPR
2003
IEEE
16 years 1 months ago
A Bayesian Approach to Image-Based Visual Hull Reconstruction
We present a Bayesian approach to image-based visual hull reconstruction. The 3-D shape of an object of a known class is represented by sets of silhouette views simultaneously obs...
Kristen Grauman, Gregory Shakhnarovich, Trevor Dar...