Sciweavers

2681 search results - page 158 / 537
» Problem F
Sort
View
107
Voted
CCS
2007
ACM
15 years 4 months ago
Offline untrusted storage with immediate detection of forking and replay attacks
We address the problem of using an untrusted server with only a trusted timestamping device (TTD) to provide trusted storage for a large number of clients, where each client may o...
Marten van Dijk, Jonathan Rhodes, Luis F. G. Sarme...
95
Voted
BMVC
2002
15 years 3 months ago
Modelling Facial Behaviours
We consider the problem of learning how a person's face behaves in a long video sequence, with the aim of synthesising convincing sequences demonstrating the same behaviours....
Franck Bettinger, Timothy F. Cootes, Christopher J...
AMDO
2008
Springer
15 years 2 months ago
Autonomous Virtual Agents for Performance Evaluation of Tracking Algorithms
This paper describes a framework which exploits the use of computer animation to evaluate the performance of tracking algorithms. This can be achieved in two different, complementa...
Pau Baiget, F. Xavier Roca, Jordi Gonzàlez
90
Voted
ASIACRYPT
2008
Springer
15 years 2 months ago
Graph Design for Secure Multiparty Computation over Non-Abelian Groups
Recently, Desmedt et al. studied the problem of achieving secure n-party computation over non-Abelian groups. They considered the passive adversary model and they assumed that the...
Xiaoming Sun, Andrew Chi-Chih Yao, Christophe Tart...
83
Voted
COCO
2008
Springer
79views Algorithms» more  COCO 2008»
15 years 2 months ago
Towards Dimension Expanders over Finite Fields
In this paper we study the problem of explicitly constructing a dimension expander raised by [BISW04]: Let Fn be the n dimensional linear space over the field F. Find a small (ide...
Zeev Dvir, Amir Shpilka