Sciweavers

1350 search results - page 214 / 270
» Reasoning about Staged Computation
Sort
View
CRYPTO
2009
Springer
150views Cryptology» more  CRYPTO 2009»
15 years 4 months ago
Short and Stateless Signatures from the RSA Assumption
We present the first signature scheme which is “short”, stateless and secure under the RSA assumption in the standard model. Prior short, standard model signatures in the RSA...
Susan Hohenberger, Brent Waters
ECSQARU
2009
Springer
15 years 4 months ago
Extracting the Core of a Persuasion Dialog to Evaluate Its Quality
: A persuasion dialog is a dialog in which agents exchange arguments on a subject. In this kind of dialog, the agents disagree about the status of the subject and each one tries to...
Leila Amgoud, Florence Dupin de Saint-Cyr
ICIW
2008
IEEE
15 years 4 months ago
NAT Traversal Method for Multi-Agent-Based Meeting Scheduling System
—We previously proposed a meeting scheduling system based on mobile agent technology. The users of our system do not need to input all of their schedules unlike the existing grou...
Yusuke Hamada, Shinichi Motomura, Takao Kawamura, ...
ICRA
2008
IEEE
123views Robotics» more  ICRA 2008»
15 years 4 months ago
Target-directed attention: Sequential decision-making for gaze planning
— It is widely agreed that efficient visual search requires the integration of target-driven top-down information and image-driven bottom-up information. Yet the problem of gaze...
Julia Vogel, Nando de Freitas
LCN
2007
IEEE
15 years 4 months ago
A Game-Theoretic Framework for Bandwidth Attacks and Statistical Defenses
Abstract—We introduce a game-theoretic framework for reasoning about bandwidth attacks, a common form of distributed denial of service (DDoS) attacks. In particular, our traffic...
Mark E. Snyder, Ravi Sundaram, Mayur Thakur