Sciweavers

679 search results - page 103 / 136
» Using decision problems in public key cryptography
Sort
View
WSC
2004
15 years 2 months ago
Resolving Mutually Exclusive Interactions in Agent Based Distributed Simulations
With the properties of autonomy, social ability, reactivity and pro-activeness, agents can be used to represent entities in distributed simulations, where fast and accurate decisi...
Lihua Wang, Stephen John Turner, Fang Wang
SIAMJO
2002
120views more  SIAMJO 2002»
15 years 28 days ago
Dual Stochastic Dominance and Related Mean-Risk Models
We consider the problem of constructing mean{risk models which are consistent with the second degree stochastic dominance relation. By exploiting duality relations of convex analys...
Wlodzimierz Ogryczak, Andrzej Ruszczynski
LPAR
2010
Springer
14 years 11 months ago
Interpolating Quantifier-Free Presburger Arithmetic
Craig interpolation has become a key ingredient in many symbolic model checkers, serving as an approximative replacement for expensive quantifier elimination. In this paper, we foc...
Daniel Kroening, Jérôme Leroux, Phili...
IFIP
2005
Springer
15 years 6 months ago
A Logic for Analysing Subterfuge in Delegation Chains
Abstract. Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic cre...
Hongbin Zhou, Simon N. Foley
ICPR
2010
IEEE
15 years 4 months ago
The Fusion of Deep Learning Architectures and Particle Filtering Applied to Lip Tracking
This work introduces a new pattern recognition model for segmenting and tracking lip contours in video sequences. We formulate the problem as a general nonrigid object tracking me...
Gustavo Carneiro, Jacinto Nascimento