• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,766
Next 10 →

under Minimal Assumptions ∗

by Alfredo Navarra, Nicolas Nisse, Alfredo Navarra, Nicolas Nisse , 2013
"... Abstract: Consider a set of mobile robots with minimal capabilities placed over distinct nodes of a discrete anonymous ring. They operate on the basis of the so called Look-Compute-Move cycle. Asynchronously, each robot takes a snapshot of the ring, determining which nodes are either occupied by rob ..."
Abstract - Add to MetaCart
and Gathering tasks. In the literature, most contributions are restricted to a subset of initial configurations. Here, we design two different algorithms and provide a full characterization of the initial configurations that permit the resolution of the problems under minimal assumptions. Key-words:

Mercurial commitments: Minimal assumptions . . .

by Dario Catalano, et al.
"... ..."
Abstract - Add to MetaCart
Abstract not found

Microbial Life Detection with Minimal Assumptions

by Samuel P. Kounavesa, Rebecca A. Nolla, Martin G. Buehlerb, Michael H. Hechtb, Kurt Lankfordc, Steven J. Westd
"... To produce definitive and unambiguous results, any life detection experiment must make minimal assumptions about the nature of extraterrestrial life. The only criteria that fits this definition is the ability to reproduce and in the process create a disequilibrium in the chemical and redox environme ..."
Abstract - Add to MetaCart
To produce definitive and unambiguous results, any life detection experiment must make minimal assumptions about the nature of extraterrestrial life. The only criteria that fits this definition is the ability to reproduce and in the process create a disequilibrium in the chemical and redox

On the Minimal Assumptions of Group Signature Schemes

by Michel Abdalla, Bogdan Warinschi, École Normale Supérieure , 2004
"... One of the central lines of cryptographic research is identifying the weakest assumptions required for the construction of secure primitives. In the context of group signatures the gap between what is known to be necessary (one-way functions) and what is known to be sufficient (trapdoor permutat ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
One of the central lines of cryptographic research is identifying the weakest assumptions required for the construction of secure primitives. In the context of group signatures the gap between what is known to be necessary (one-way functions) and what is known to be sufficient (trapdoor

Minimal Assumptions for Efficient Mercurial Commitments

by Yevgeniy Dodis , 2005
"... Mercurial commitments were introduced by Chase et al. [8] and form a key building block for constructing zero-knowledge sets (introduced by Micali, Rabin and Kilian [27]). Unlike regular commitments, which are strictly binding, mercurial commitments allow for certain amount of (limited) freedom. T ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
] gave several constructions of mercurial commitments from various incompatible assumptions, leaving open if they can be built from any (trapdoor) commitment scheme, and, in particular, from any one-way function. We give an affirmative answer to this question, by giving two simple constructions

1 Quantum Gravity with Minimal Assumptions

by Miyuki Nishikawa , 2002
"... Several basic results are reviewed on purpose to construct the quantum field theory including gravity, based on physical assumptions as few as possible. Up to now, the work by Steven Weinberg probably suits this purpose the most. Motivated by these results we focus on the fact that the dimension of ..."
Abstract - Add to MetaCart
Several basic results are reviewed on purpose to construct the quantum field theory including gravity, based on physical assumptions as few as possible. Up to now, the work by Steven Weinberg probably suits this purpose the most. Motivated by these results we focus on the fact that the dimension

Robust ASR with unreliable data and minimal assumptions

by Martin Cooke, Phil Green, Ljubomir Josifovski, Ascension Vizinho - in Proc., Robust’99 , 1999
"... Human speech perception withstands a wide variety of distortions, both experimentally applied and naturallyoccurring. A novel approach to these situations in robust ASR identifies the spectro-temporal regions which carry reliable speech evidence and treats the remainder as missing or uncertain. This ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
. This standpoint makes minimal assumptions about any noise background. This paper describes two approaches to the adaptation of continuous-density hidden Markov model-based speech recognisers to deal with missing and uncertain acoustic data. The first computes output probabilities on the basis of the reliable

Environmental regulation can arise under minimal assumptions

by J Mcdonald-Gibson , J G Dyke , E A Di Paolo , I R Harvey - Journal of Theoretical Biology , 2008
"... Abstract Models that demonstrate environmental regulation as a consequence of organism and environment coupling all require a number of core assumptions. Many previous models, such as Daisyworld, require that certain environment-altering traits have a selective advantage when those traits also cont ..."
Abstract - Cited by 4 (3 self) - Add to MetaCart
the regulation against mutations that would otherwise destroy it. Sensitivity analysis shows that the regulation is robust to mutation and to a wide range of parameter settings. Given the minimal assumptions employed, the results could reveal a mechanism capable of environmental regulation through the by

Gathering and exclusive searching on rings under minimal assumptions

by Alfredo Navarra, Nicolas Nisse - In Proc of ICDCN 2014, volume 8314 of LNCS , 2014
"... Abstract. Consider a set of mobile robots with minimal capabilities placed over distinct nodes of a discrete anonymous ring. Asynchronously, each robot takes a snapshot of the ring, determining which nodes are ei-ther occupied by robots or empty. Based on the observed configuration, it decides wheth ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
that permit the resolution of the problems under minimal assumptions. 1

Leakage-Resilient Cryptography from Minimal Assumptions

by Carmit Hazay, Adriana López-alt, Hoeteck Wee, Daniel Wichs , 2012
"... We present new constructions of leakage-resilient cryptosystems, which remain provably secure even if the attacker learns some arbitrary partial information about their internal secret key. For any polynomial ℓ, we can instantiate these schemes so as to tolerate up to ℓ bits of leakage. While there ..."
Abstract - Cited by 8 (1 self) - Add to MetaCart
there has been much prior work constructing such leakage-resilient cryptosystems under concrete number-theoretic and algebraic assumptions, we present the first schemes under general and minimal assumptions. In particular, we construct: • Leakage-resilient public-key encryption from any standard public
Next 10 →
Results 1 - 10 of 5,766
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University