Sciweavers

5592 search results - page 166 / 1119
» On Random Betweenness Constraints
Sort
View
148
Voted
EUROCRYPT
2009
Springer
16 years 5 months ago
Verifiable Random Functions from Identity-Based Key Encapsulation
We propose a methodology to construct verifiable random functions from a class of identity based key encapsulation mechanisms (IB-KEM) that we call VRF suitable. Informally, an IB-...
Michel Abdalla, Dario Catalano, Dario Fiore
STOC
2003
ACM
95views Algorithms» more  STOC 2003»
16 years 5 months ago
Random knapsack in expected polynomial time
In this paper, we present the first average-case analysis proving an expected polynomial running time for an exact algorithm for the 0/1 knapsack problem. In particular, we prove,...
René Beier, Berthold Vöcking
ICASSP
2009
IEEE
15 years 11 months ago
ViBE: A powerful random technique to estimate the background in video sequences
Background subtraction is a crucial step in many automatic video content analysis applications. While numerous acceptable techniques have been proposed so far for background extra...
Olivier Barnich, Marc Van Droogenbroeck
ICDM
2009
IEEE
168views Data Mining» more  ICDM 2009»
15 years 11 months ago
Bi-relational Network Analysis Using a Fast Random Walk with Restart
—Identification of nodes relevant to a given node in a relational network is a basic problem in network analysis with great practical importance. Most existing network analysis ...
Jing Xia, Doina Caragea, William H. Hsu
GLOBECOM
2008
IEEE
15 years 11 months ago
Cooperative MAC for Rate Adaptive Randomized Distributed Space-Time Coding
—In a distributed wireless network, it is possible to employ several relays and mimic a multiple antenna transmission system. In this paper we propose a MAC layer solution that a...
Pei Liu, Yuanpeng Liu, Thanasis Korakis, Anna Scag...