نتایج جستجو برای: growth parameter

تعداد نتایج: 1024525  

2003
Piero Cosi Andrea Fusaro Graziano Tisato

LUCIA, a new Italian talking head based on a modified version of the Cohen-Massaro’s labial coarticulation model is described. A semi-automatic minimization technique, working on real cinematic data, acquired by the ELITE optoelectronic system, was used to train the dynamic characteristics of the model. LUCIA is an MPEG-4 standard facial animation system working on standard FAP visual parameter...

2009
Sébastien Canard Cécile Delerablée Aline Gouget Emeline Hufschmitt Fabien Laguillaumie Hervé Sibert Jacques Traoré Damien Vergnaud

We present the first fair e-cash system with a compact wallet that enables users to spend efficiently k coins while only sending to the merchant O(λ log k) bits, where λ is a security parameter. The best previously known schemes require to transmit data of size at least linear in the number of spent coins. This result is achieved thanks to a new way to use the Batch RSA technique and a tree-bas...

Journal: :J. Algorithms 2003
Tomás Feder Rajeev Motwani Liadan O'Callaghan Christopher Olston Rina Panigrahy

We consider the problem of estimating the length of a shortest path in a DAG whose edge lengths are known only approximately but can be determined exactly at a cost. Initially, each edge e is known only to lie within an interval [le; he]; the estimation algorithm can pay ce to nd the exact length of e. In particular, we study the problem of nding the cheapest set of edges such that, if exactly ...

Journal: :IACR Cryptology ePrint Archive 2014
Hyung Tae Lee Jae Hong Seo

At Crypto 2013, Coron, Lepoint, and Tibouchi (CLT) proposed a practical Graded Encoding Scheme (GES) over the integers, which has very similar cryptographic features to ideal multilinear maps. In fact, the scheme of Coron et al. is the second proposal of a secure GES, and has advantages over the first scheme of Garg, Gentry, and Halevi (GGH). For example, unlike the GGH construction, the subgro...

Journal: :IACR Cryptology ePrint Archive 2005
Tsz Hon Yuen Victor K.-W. Wei

We construct the first constant-size hierarchical identity-based signature (HIBS) without random oracles the signature size is O(λs) bits, where λs is the security parameter, and it is independent of the number of levels in the hierarchy. We observe that an efficient hierarchical identity-based signcryption (HIBSC) scheme without random oracles can be compositioned from our HIBS and Boneh, Boye...

2005
Albert Krohn Michael Beigl Christian Decker Tobias Zimmer

The ordering of messages according to a given time measure is a largely discussed topic. Nevertheless, wireless or wired systems considering the order of messages do not use the access layer to accomplish this task. In this paper, we discuss the use of non-destructive bit-wise arbitration on the MAC layer for real-time message ordering in wireless sensor networks. With this access method, it is...

Journal: :Journal of molecular biology 2012
Harold P Erickson

The bacterial actin homolog ParM has always been modeled as a polar filament, comprising two parallel helical strands, like actin itself. I present arguments here that ParM may be an apolar filament, in which the two helical strands are antiparallel.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید