Results 1 - 10
of
5,766
under Minimal Assumptions ∗
, 2013
"... Abstract: Consider a set of mobile robots with minimal capabilities placed over distinct nodes of a discrete anonymous ring. They operate on the basis of the so called Look-Compute-Move cycle. Asynchronously, each robot takes a snapshot of the ring, determining which nodes are either occupied by rob ..."
Abstract
- Add to MetaCart
and Gathering tasks. In the literature, most contributions are restricted to a subset of initial configurations. Here, we design two different algorithms and provide a full characterization of the initial configurations that permit the resolution of the problems under minimal assumptions. Key-words:
Microbial Life Detection with Minimal Assumptions
"... To produce definitive and unambiguous results, any life detection experiment must make minimal assumptions about the nature of extraterrestrial life. The only criteria that fits this definition is the ability to reproduce and in the process create a disequilibrium in the chemical and redox environme ..."
Abstract
- Add to MetaCart
To produce definitive and unambiguous results, any life detection experiment must make minimal assumptions about the nature of extraterrestrial life. The only criteria that fits this definition is the ability to reproduce and in the process create a disequilibrium in the chemical and redox
On the Minimal Assumptions of Group Signature Schemes
, 2004
"... One of the central lines of cryptographic research is identifying the weakest assumptions required for the construction of secure primitives. In the context of group signatures the gap between what is known to be necessary (one-way functions) and what is known to be sufficient (trapdoor permutat ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
One of the central lines of cryptographic research is identifying the weakest assumptions required for the construction of secure primitives. In the context of group signatures the gap between what is known to be necessary (one-way functions) and what is known to be sufficient (trapdoor
Minimal Assumptions for Efficient Mercurial Commitments
, 2005
"... Mercurial commitments were introduced by Chase et al. [8] and form a key building block for constructing zero-knowledge sets (introduced by Micali, Rabin and Kilian [27]). Unlike regular commitments, which are strictly binding, mercurial commitments allow for certain amount of (limited) freedom. T ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
] gave several constructions of mercurial commitments from various incompatible assumptions, leaving open if they can be built from any (trapdoor) commitment scheme, and, in particular, from any one-way function. We give an affirmative answer to this question, by giving two simple constructions
1 Quantum Gravity with Minimal Assumptions
, 2002
"... Several basic results are reviewed on purpose to construct the quantum field theory including gravity, based on physical assumptions as few as possible. Up to now, the work by Steven Weinberg probably suits this purpose the most. Motivated by these results we focus on the fact that the dimension of ..."
Abstract
- Add to MetaCart
Several basic results are reviewed on purpose to construct the quantum field theory including gravity, based on physical assumptions as few as possible. Up to now, the work by Steven Weinberg probably suits this purpose the most. Motivated by these results we focus on the fact that the dimension
Robust ASR with unreliable data and minimal assumptions
- in Proc., Robust’99
, 1999
"... Human speech perception withstands a wide variety of distortions, both experimentally applied and naturallyoccurring. A novel approach to these situations in robust ASR identifies the spectro-temporal regions which carry reliable speech evidence and treats the remainder as missing or uncertain. This ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
. This standpoint makes minimal assumptions about any noise background. This paper describes two approaches to the adaptation of continuous-density hidden Markov model-based speech recognisers to deal with missing and uncertain acoustic data. The first computes output probabilities on the basis of the reliable
Environmental regulation can arise under minimal assumptions
- Journal of Theoretical Biology
, 2008
"... Abstract Models that demonstrate environmental regulation as a consequence of organism and environment coupling all require a number of core assumptions. Many previous models, such as Daisyworld, require that certain environment-altering traits have a selective advantage when those traits also cont ..."
Abstract
-
Cited by 4 (3 self)
- Add to MetaCart
the regulation against mutations that would otherwise destroy it. Sensitivity analysis shows that the regulation is robust to mutation and to a wide range of parameter settings. Given the minimal assumptions employed, the results could reveal a mechanism capable of environmental regulation through the by
Gathering and exclusive searching on rings under minimal assumptions
- In Proc of ICDCN 2014, volume 8314 of LNCS
, 2014
"... Abstract. Consider a set of mobile robots with minimal capabilities placed over distinct nodes of a discrete anonymous ring. Asynchronously, each robot takes a snapshot of the ring, determining which nodes are ei-ther occupied by robots or empty. Based on the observed configuration, it decides wheth ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
that permit the resolution of the problems under minimal assumptions. 1
Leakage-Resilient Cryptography from Minimal Assumptions
, 2012
"... We present new constructions of leakage-resilient cryptosystems, which remain provably secure even if the attacker learns some arbitrary partial information about their internal secret key. For any polynomial ℓ, we can instantiate these schemes so as to tolerate up to ℓ bits of leakage. While there ..."
Abstract
-
Cited by 8 (1 self)
- Add to MetaCart
there has been much prior work constructing such leakage-resilient cryptosystems under concrete number-theoretic and algebraic assumptions, we present the first schemes under general and minimal assumptions. In particular, we construct: • Leakage-resilient public-key encryption from any standard public
Results 1 - 10
of
5,766