Sciweavers

1753 search results - page 68 / 351
» State Machines
Sort
View
91
Voted
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
15 years 4 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
ICML
2010
IEEE
14 years 11 months ago
Efficient Reinforcement Learning with Multiple Reward Functions for Randomized Controlled Trial Analysis
We introduce new, efficient algorithms for value iteration with multiple reward functions and continuous state. We also give an algorithm for finding the set of all nondominated a...
Daniel J. Lizotte, Michael H. Bowling, Susan A. Mu...
ICCAD
2001
IEEE
89views Hardware» more  ICCAD 2001»
15 years 7 months ago
Sequential SPFDs
SPFDs are a mechanism to express flexibility in Boolean networks. Introduced by Yamashita et al. in the context of FPGA synthesis [4], they were extended later to general combina...
Subarnarekha Sinha, Andreas Kuehlmann, Robert K. B...
ICVGIP
2004
14 years 11 months ago
A Framework for Activity Recognition and Detection of Unusual Activities
In this paper we present a simple framework for activity recognition based on a model of multi-layered finite state machines, built on top of a low level image processing module f...
Dhruv Mahajan, Nipun Kwatra, Sumit Jain, Prem Kalr...
ICECCS
1997
IEEE
125views Hardware» more  ICECCS 1997»
15 years 2 months ago
Client--Access Protocols for Replicated Services
The paper addresses the problem of client–service interaction in the case of replicated service provision. Existing systems that follow the State Machine approach concentrate on...
Christos T. Karamanolis, Jeff Magee