Sciweavers

2601 search results - page 145 / 521
» Secure Rewarding Schemes
Sort
View
AGENTS
1999
Springer
15 years 7 months ago
General Principles of Learning-Based Multi-Agent Systems
We consider the problem of how to design large decentralized multiagent systems (MAS’s) in an automated fashion, with little or no hand-tuning. Our approach has each agent run a...
David Wolpert, Kevin R. Wheeler, Kagan Tumer
CVPR
2007
IEEE
15 years 9 months ago
Secure Biometric Templates from Fingerprint-Face Features
Since biometric data cannot be easily replaced or revoked, it is important that biometric templates used in biometric applications should be constructed and stored in a secure way...
Yagiz Sutcu, Qiming Li, Nasir D. Memon
ISM
2006
IEEE
76views Multimedia» more  ISM 2006»
15 years 9 months ago
Peer-to-Peer Secure and Private Community Based Multimedia Communications
We have designed and implemented P2PWNC, a fully distributed, open to all, autonomous WLAN roaming scheme that can be used in a community to provide various multimedia communicati...
Pantelis A. Frangoudis, George C. Polyzos
ICDCS
2003
IEEE
15 years 8 months ago
Responsive Security for Stored Data
We present the design of a distributed store that offers various levels of security guarantees while tolerating a limited number of nodes that are compromised by an adversary. The...
Subramanian Lakshmanan, Mustaque Ahamad, H. Venkat...
EEE
2004
IEEE
15 years 7 months ago
An Efficient, Secure and Delegable Micro-Payment System
In this paper, we propose a new efficient and secure micro-payment scheme, named e-coupons, which can provide the users the facility of delegating their spending capability to oth...
Vishwas Patil, R. K. Shyamasundar