Sciweavers

330 search results - page 34 / 66
» Random Indexing Revisited
Sort
View
PKC
2010
Springer
187views Cryptology» more  PKC 2010»
15 years 2 months ago
Confidential Signatures and Deterministic Signcryption
Encrypt-and-sign, where one encrypts and signs a message in parallel, is usually not recommended for confidential message transmission. The reason is that the signature typically l...
Alexander W. Dent, Marc Fischlin, Mark Manulis, Ma...
NIPS
2004
15 years 1 months ago
Common-Frame Model for Object Recognition
A generative probabilistic model for objects in images is presented. An object consists of a constellation of features. Feature appearance and pose are modeled probabilistically. ...
Pierre Moreels, Pietro Perona
116
Voted
INFORMATICALT
2006
100views more  INFORMATICALT 2006»
15 years 11 days ago
Optimal Agreement in a Scale-Free Network Environment
Generally, the task in a distributed system must achieve an agreement. It requires a set of processors to agree on a common value even if some components are corrupted. There are s...
Shu-Ching Wang, Kuo-Qin Yan, Mao-Lun Chiang
106
Voted
ALIFE
2004
15 years 8 days ago
Autopoiesis and Cognition
This article revisits the concept of autopoiesis and examines its relation to cognition and life. We present a mathematical model of a 3D tesselation automaton, considered as a min...
Paul Bourgine, John Stewart
78
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
Topological Properties Affect the Power of Network Coding in Decentralized Broadcast
—There exists a certain level of ambiguity regarding whether network coding can further improve download performance in P2P content distribution systems, as compared to commonly ...
Di Niu, Baochun Li