Sciweavers

882 search results - page 43 / 177
» Visibility-driven transfer functions
Sort
View
PE
2006
Springer
130views Optimization» more  PE 2006»
15 years 1 months ago
Analysis of resource transfers in peer-to-peer file sharing applications using fluid models
This paper proposes a stochastic fluid flow model to compute the transfer time distribution of resources in peer-to-peer file sharing applications. The amount of bytes transferred...
Rossano Gaeta, Marco Gribaudo, Daniele Manini, Mat...
EUROCRYPT
2006
Springer
15 years 5 months ago
Optimal Reductions Between Oblivious Transfers Using Interactive Hashing
Abstract. We present an asymptotically optimal reduction of one-outof-two String Oblivious Transfer to one-out-of-two Bit Oblivious Transfer using Interactive Hashing in conjunctio...
Claude Crépeau, George Savvides
FC
2008
Springer
134views Cryptology» more  FC 2008»
15 years 3 months ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
AAAI
2006
15 years 2 months ago
Using Homomorphisms to Transfer Options across Continuous Reinforcement Learning Domains
We examine the problem of Transfer in Reinforcement Learning and present a method to utilize knowledge acquired in one Markov Decision Process (MDP) to bootstrap learning in a mor...
Vishal Soni, Satinder P. Singh
FGCS
2006
61views more  FGCS 2006»
15 years 1 months ago
Long-range static directional stress transfer in a cracked, nonlinear elastic crust
Seeing the Earth crust as criss-crossed by faults filled with fluid at close to lithostatic pressures, we develop a model in which its elastic modulii are different in net tension...
Guy Ouillon, Didier Sornette