Sciweavers

4850 search results - page 931 / 970
» Proof and Computation in Geometry
Sort
View
97
Voted
CCS
2008
ACM
15 years 28 days ago
Online subscriptions with anonymous access
Online privacy is an increasingly important problem, as many services are now offered in a digital form. Privacy (or the lack thereof) is of a special concern in subscriptions to ...
Marina Blanton
85
Voted
CCS
2008
ACM
15 years 28 days ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud
81
Voted
COCO
2005
Springer
130views Algorithms» more  COCO 2005»
15 years 26 days ago
Pseudorandom Bits for Constant Depth Circuits with Few Arbitrary Symmetric Gates
We exhibit an explicitly computable ‘pseudorandom’ generator stretching l bits into m(l) = lΩ(log l) bits that look random to constant-depth circuits of size m(l) with log m...
Emanuele Viola
NIPS
2003
15 years 8 days ago
Maximum Likelihood Estimation of a Stochastic Integrate-and-Fire Neural Model
Recent work has examined the estimation of models of stimulus-driven neural activity in which some linear filtering process is followed by a nonlinear, probabilistic spiking stag...
Jonathan Pillow, Liam Paninski, Eero P. Simoncelli
92
Voted
IJCAI
1993
15 years 7 days ago
A New Logical framework for Deductive Planning
objects, like elements of (abstract) data types in ordinary programming languages In the theory of abstract data types most often one only considers algebraic structures where all ...
Werner Stephan, Susanne Biundo