Sciweavers

1401 search results - page 65 / 281
» Randomness in Interactive Proofs
Sort
View
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
13 years 5 days ago
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Abstract. An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and ...
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Ka...
SENSYS
2003
ACM
15 years 3 months ago
SIA: secure information aggregation in sensor networks
Sensor networks promise viable solutions to many monitoring problems. However, the practical deployment of sensor networks faces many challenges imposed by real-world demands. Sen...
Bartosz Przydatek, Dawn Xiaodong Song, Adrian Perr...
CVPR
2011
IEEE
14 years 6 months ago
Using Global Bag of Features Models in Random Fields for Joint Categorization and Segmentation of Objects
We propose to bridge the gap between Random Field (RF) formulations for joint categorization and segmentation (JCaS), which model local interactions among pixels and superpixels, ...
Dheeraj Singaraju, René, Vidal
ISCAS
2008
IEEE
107views Hardware» more  ISCAS 2008»
15 years 4 months ago
A passive filter aided timing recovery scheme
— This paper presents a passive filter for the front end of a high speed serial link receiver to aid timing recovery. The filter provides simultaneous lowpass and highpass tran...
Faisal A. Musa, Anthony Chan Carusone
CPC
2006
93views more  CPC 2006»
14 years 9 months ago
Distribution of Vertex Degree in Web-Graphs
We give results for the age dependent distribution of vertex degree and number of vertices of given degree in the undirected web-graph process, a discrete random graph process int...
Colin Cooper