Sciweavers

681 search results - page 86 / 137
» et 2006
Sort
View
ETS
2006
IEEE
118views Hardware» more  ETS 2006»
15 years 3 months ago
Living with Failure: Lessons from Nature?
- The resources available on a chip continue to grow, following Moore's Law. However, the major process by which the benefits of Moore's Law accrue, which is the continui...
Steve Furber
STOC
2006
ACM
152views Algorithms» more  STOC 2006»
15 years 10 months ago
Private approximation of search problems
Many approximation algorithms have been presented in the last decades for hard search problems. The focus of this paper is on cryptographic applications, where it is desired to de...
Amos Beimel, Paz Carmi, Kobbi Nissim, Enav Weinreb
IJCV
2006
161views more  IJCV 2006»
14 years 9 months ago
Discriminative Random Fields
In this research we address the problem of classification and labeling of regions given a single static natural image. Natural images exhibit strong spatial dependencies, and mode...
Sanjiv Kumar, Martial Hebert
88
Voted
IPL
2006
141views more  IPL 2006»
14 years 9 months ago
Perfectly Reliable Message Transmission
We study the problem of Perfectly Reliable Message Transmission (PRMT) and Perfectly Secure Message Transmission (PSMT) between two nodes S and R in an undirected synchronous netw...
Arvind Narayanan, K. Srinathan, C. Pandu Rangan
JCS
2006
157views more  JCS 2006»
14 years 9 months ago
Analysis of probabilistic contract signing
We present three case studies, investigating the use of probabilistic model checking to automatically analyse properties of probabilistic contract signing protocols. We use the pr...
Gethin Norman, Vitaly Shmatikov