Sciweavers

14379 search results - page 2851 / 2876
» is 2000
Sort
View
JIRS
2000
144views more  JIRS 2000»
14 years 10 months ago
An Integrated Approach of Learning, Planning, and Execution
Agents (hardware or software) that act autonomously in an environment have to be able to integrate three basic behaviors: planning, execution, and learning. This integration is man...
Ramón García-Martínez, Daniel...
JMIV
2000
141views more  JMIV 2000»
14 years 10 months ago
Critical Motions for Auto-Calibration When Some Intrinsic Parameters Can Vary
Auto-calibration is the recovery of the full camera geometry and Euclidean scene structure from several images of an unknown 3D scene, using rigidity constraints and partial knowl...
Fredrik Kahl, Bill Triggs, Kalle Åström
JNCA
2000
117views more  JNCA 2000»
14 years 10 months ago
Distributed network storage service with quality-of-service guarantees
This paper envisions a distributed network storage service with Quality-ofService (QoS) guarantees, and describes its architecture and key mechanisms. When fully realized, this se...
John Chung-I Chuang, Marvin A. Sirbu
JOC
2000
95views more  JOC 2000»
14 years 10 months ago
Player Simulation and General Adversary Structures in Perfect Multiparty Computation
The goal of secure multiparty computation is to transform a given protocol involving a trusted party into a protocol without need for the trusted party, by simulating the party am...
Martin Hirt, Ueli M. Maurer
JOC
2000
181views more  JOC 2000»
14 years 10 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
« Prev « First page 2851 / 2876 Last » Next »