Sciweavers

679 search results - page 101 / 136
» Using decision problems in public key cryptography
Sort
View
CCS
2008
ACM
15 years 3 months ago
Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma
Multisignatures allow n signers to produce a short joint signature on a single message. Multisignatures were achieved in the plain model with a non-interactive protocol in groups ...
Ali Bagherzandi, Jung Hee Cheon, Stanislaw Jarecki
ICCV
1999
IEEE
16 years 3 months ago
An Integrated Bayesian Approach to Layer Extraction from Image Sequences
This paper describes a Bayesian approach for modeling 3D scenes as a collection of approximately planar layers that are arbitrarily positioned and oriented in the scene. In contra...
Philip H. S. Torr, Richard Szeliski, P. Anandan
RSCTC
2004
Springer
164views Fuzzy Logic» more  RSCTC 2004»
15 years 6 months ago
Rough Set Methodology in Clinical Practice: Controlled Hospital Trial of the MET System
Abstract. Acute abdominal pain in childhood is a common but diagnostically challenging problem facing Emergency Department personnel. Experienced physicians use a combination of ke...
Ken Farion, Wojtek Michalowski, Roman Slowinski, S...
CHI
2004
ACM
16 years 1 months ago
Common sense investing: bridging the gap between expert and novice
In this paper, we describe Common Sense Investing (CSI), an interactive investment tool that uses a knowledge base of common sense statements in conjunction with domain knowledge ...
Ashwani Kumar, Sharad C. Sundararajan, Henry Liebe...
IPPS
2006
IEEE
15 years 7 months ago
k-anycast routing schemes for mobile ad hoc networks
— Anycast is a communication paradigm that was first introduced to the suit of routing protocols in IPv6 networks. In anycast, a packet is intended to be delivered to one of the...
Bing Wu, Jie Wu