Results 1 - 10
of
289
Secure Commitment Against A Powerful Adversary - A security primitive based on average intractability (Extended Abstract)
, 1992
"... Secure commitment is a primitive enabling information hiding, which is one of the most basic tools in cryptography. Specifically, it is a two-party partial-information game between a "committer" and a "receiver", in which a secure envelope is first implemented and later opened. T ..."
Abstract
-
Cited by 14 (6 self)
- Add to MetaCart
Secure commitment is a primitive enabling information hiding, which is one of the most basic tools in cryptography. Specifically, it is a two-party partial-information game between a "committer" and a "receiver", in which a secure envelope is first implemented and later opened. The committer has a bit in mind which he commits to by putting it in a "secure envelope". The receiver cannot guess what the value is until the opening stage and the committer can not change his mind once committed. In this paper, we investigate the feasibility of bit commitment when one of the participants (either committer or receiver) has an unfair computational advantage. That is, we consider commitment to a strong receiver with a To appear in Symposium on Theoretical Aspects of Computer Science (STACS) 92, February 13-15, Paris, France. y MIT Laboratory for Computer Science, 545 Technology Square, Cambridge MA 02139, USA. Supported by IBM Graduate Fellowship. Part of this work done while at IBM T.J. W...
Policy gradient methods for reinforcement learning with function approximation.
- In NIPS,
, 1999
"... Abstract Function approximation is essential to reinforcement learning, but the standard approach of approximating a value function and determining a policy from it has so far proven theoretically intractable. In this paper we explore an alternative approach in which the policy is explicitly repres ..."
Abstract
-
Cited by 439 (20 self)
- Add to MetaCart
Abstract Function approximation is essential to reinforcement learning, but the standard approach of approximating a value function and determining a policy from it has so far proven theoretically intractable. In this paper we explore an alternative approach in which the policy is explicitly
Average-Case Intractability vs. Worst-Case Intractability
- IN THE 23RD INTERNATIONAL SYMPOSIUM ON MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE
, 1998
"... We use the assumption that all sets in NP (or other levels of the polynomial-time hierarchy) have efficient average-case algorithms to derive collapse consequences for MA, AM, and various subclasses of P/poly. As a further consequence we show for C 2 fP(PP);PSPACEg that C is not tractable in the a ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
We use the assumption that all sets in NP (or other levels of the polynomial-time hierarchy) have efficient average-case algorithms to derive collapse consequences for MA, AM, and various subclasses of P/poly. As a further consequence we show for C 2 fP(PP);PSPACEg that C is not tractable
Average-Case Intractable NP Problems
- Advances in Languages, Algorithms, and Complexity
, 1997
"... The notion of NP-completeness has provided a rigorous mathematical definition for measuring intractability of NP problems. But this measure applies only to worst-case complexity. Being NP-complete does not indicate that a problem is intractable on the average case. Indeed, some NP-complete probl ..."
Abstract
-
Cited by 10 (1 self)
- Add to MetaCart
The notion of NP-completeness has provided a rigorous mathematical definition for measuring intractability of NP problems. But this measure applies only to worst-case complexity. Being NP-complete does not indicate that a problem is intractable on the average case. Indeed, some NP
Using Average Case Intractability in Cryptography
, 2004
"... One of the most critical questions in Cryptography is referred to the misunderstanding equivalence between using a difficult problem as basis of a cryptographic application and its security verification. Under this erroneous perspective, it is common using problems belonging to NP (according to the ..."
Abstract
- Add to MetaCart
the description of a new multiparty protocol devoted to the sharing of secrets whose main application is related to key management. The main particularity of this scheme is that it is based on a problem classified as DistNP-Complete under the average-case analysis, the so called Distributional Matrix
Honest Exploration of Intractable Probability Distributions Via Markov Chain Monte Carlo
- STATISTICAL SCIENCE
, 2001
"... Two important questions that must be answered whenever a Markov chain Monte Carlo (MCMC) algorithm is used are (Q1) What is an appropriate burn-in? and (Q2) How long should the sampling continue after burn-in? Developing rigorous answers to these questions presently requires a detailed study of the ..."
Abstract
-
Cited by 105 (32 self)
- Add to MetaCart
and minorization conditions to construct a formula giving an analytic upper bound on the distance to stationarity. A rigorous answer to (Q1) can be calculated using this formula. The desired characteristics of the target distribution are typically estimated using ergodic averages. Geometric ergodicity
Surgical Management for Intractable Metatarsalgia
"... We reviewed the results of arthrodesis of the first meta-tarsophalangeal joint and excisional arthroplasty of the lesser metatarsophalangeal joints performed on patients who presented intractable metatarsalgia and forefoot deformities. The study included 18 feet (15 patients) in 12 women and 3 men. ..."
Abstract
- Add to MetaCart
We reviewed the results of arthrodesis of the first meta-tarsophalangeal joint and excisional arthroplasty of the lesser metatarsophalangeal joints performed on patients who presented intractable metatarsalgia and forefoot deformities. The study included 18 feet (15 patients) in 12 women and 3 men
Suprachoroidal implant surgery in intractable glaucoma
"... Abstract Purpose To report the early results of suprachoroidal silicone implant surgery in intractable glaucoma. Materials and methods A modified silicone implant with no valve was implanted into the suprachoroidal space of 15 eyes with intractable glaucoma. Results The mean age of the patients was ..."
Abstract
- Add to MetaCart
Abstract Purpose To report the early results of suprachoroidal silicone implant surgery in intractable glaucoma. Materials and methods A modified silicone implant with no valve was implanted into the suprachoroidal space of 15 eyes with intractable glaucoma. Results The mean age of the patients
Fibrin Glue Closure for Intractable Pancreatic Fistulae after
, 2014
"... Context: Treatment of pancreatic fistulae after pancreaticoduodenectomy is extremely important because it determines the patient's postoperative course. In particular, treatment of Grade B cases should be conducted in a timely manner to avoid deterioration to grade C. Objective We report the su ..."
Abstract
- Add to MetaCart
the successful treatment of six cases of postoperative intractable, Grade B pancreatic fistulae, in which fistula closure was achieved through the use of tissue adhesive. Methods Six subjects presented at our hospital with Grade B pancreatic fistulae after pancreaticoduodenectomy. In all cases, the drain amylase
Average-case computational complexity theory
- Complexity Theory Retrospective II
, 1997
"... ABSTRACT Being NP-complete has been widely interpreted as being computationally intractable. But NP-completeness is a worst-case concept. Some NP-complete problems are \easy on average", but some may not be. How is one to know whether an NP-complete problem is \di cult on average"? ..."
Abstract
-
Cited by 32 (2 self)
- Add to MetaCart
ABSTRACT Being NP-complete has been widely interpreted as being computationally intractable. But NP-completeness is a worst-case concept. Some NP-complete problems are \easy on average", but some may not be. How is one to know whether an NP-complete problem is \di cult on average
Results 1 - 10
of
289