Sciweavers

679 search results - page 70 / 136
» Using decision problems in public key cryptography
Sort
View
INFOCOM
2008
IEEE
15 years 7 months ago
A Scalable Method for Access Control in Location-Based Broadcast Services
Abstract. One important problem for such public broadcast LBS is to enforce access control on a large number of subscribers. In such a system a user typically subscribes to a LBS f...
Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Li...
VMV
2008
107views Visualization» more  VMV 2008»
15 years 2 months ago
Learning with Few Examples using a Constrained Gaussian Prior on Randomized Trees
Machine learning with few training examples always leads to over-fitting problems, whereas human individuals are often able to recognize difficult object categories from only one ...
Erik Rodner, Joachim Denzler
MOBISYS
2011
ACM
14 years 4 months ago
ProxiMate: proximity-based secure pairing using ambient wireless signals
Forming secure associations between wireless devices that do not share a prior trust relationship is an important problem. This paper presents ProxiMate, a system that allows wire...
Suhas Mathur, Robert C. Miller, Alexander Varshavs...
ICCAD
2006
IEEE
128views Hardware» more  ICCAD 2006»
15 years 10 months ago
Improvements to combinational equivalence checking
The paper explores several ways to improve the speed and capacity of combinational equivalence checking based on Boolean satisfiability (SAT). State-of-the-art methods use simulat...
Alan Mishchenko, Satrajit Chatterjee, Robert K. Br...
ICANN
2009
Springer
15 years 8 months ago
Almost Random Projection Machine
Backpropagation of errors is not only hard to justify from biological perspective but also it fails to solve problems requiring complex logic. A simpler algorithm based on generati...
Wlodzislaw Duch, Tomasz Maszczyk