Sciweavers

7342 search results - page 1336 / 1469
» Optimal Language Learning
Sort
View
EUROCRYPT
2004
Springer
15 years 7 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer
CRYPTO
2000
Springer
149views Cryptology» more  CRYPTO 2000»
15 years 6 months ago
A Cryptographic Solution to a Game Theoretic Problem
In this work we use cryptography to solve a game-theoretic problem which arises naturally in the area of two party strategic games. The standard game-theoretic solution concept for...
Yevgeniy Dodis, Shai Halevi, Tal Rabin
SEAL
1998
Springer
15 years 6 months ago
Automating Space Allocation in Higher Education
The allocation of office space in any large institution is usually a problematical issue, which often demands a substantial amount of time to perform manually. The result of this a...
Edmund K. Burke, D. B. Varley
COLT
1995
Springer
15 years 5 months ago
Regression NSS: An Alternative to Cross Validation
The Noise Sensitivity Signature (NSS), originally introduced by Grossman and Lapedes (1993), was proposed as an alternative to cross validation for selecting network complexity. I...
Michael P. Perrone, Brian S. Blais
SCA
2007
15 years 4 months ago
Face poser: interactive modeling of 3D facial expressions using model priors
In this paper, we present an intuitive interface for interactively posing 3D facial expressions. The user can create and edit facial expressions by drawing freeform strokes, or by...
Manfred Lau, Jinxiang Chai, Ying-Qing Xu, Heung-Ye...
« Prev « First page 1336 / 1469 Last » Next »