Sciweavers

6907 search results - page 264 / 1382
» Securing distributed adaptation
Sort
View
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
15 years 5 months ago
Experimental verification of formation control with distributed cameras
Abstract-- Formation control experiments are performed using two robots, each equipped with a camera. When both robots are fully informed of the reference velocity, a decentralized...
He Bai, Karen D. Chapin, John Wason, John T. Wen
CORR
2010
Springer
96views Education» more  CORR 2010»
15 years 4 months ago
Learning High-Dimensional Markov Forest Distributions: Analysis of Error Rates
The problem of learning forest-structured discrete graphical models from i.i.d. samples is considered. An algorithm based on pruning of the Chow-Liu tree through adaptive threshol...
Vincent Y. F. Tan, Animashree Anandkumar, Alan S. ...
ASIACRYPT
2009
Springer
15 years 8 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
ISPEC
2010
Springer
15 years 6 months ago
Certificateless KEM and Hybrid Signcryption Schemes Revisited
Often authentication and confidentiality are required as simultaneous key requirements in many cryptographic applications. The cryptographic primitive called signcryption effective...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 4 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin