Results 1  10
of
558,723
under Minimal Assumptions ∗
, 2013
"... Abstract: Consider a set of mobile robots with minimal capabilities placed over distinct nodes of a discrete anonymous ring. They operate on the basis of the so called LookComputeMove cycle. Asynchronously, each robot takes a snapshot of the ring, determining which nodes are either occupied by rob ..."
Abstract
 Add to MetaCart
and Gathering tasks. In the literature, most contributions are restricted to a subset of initial configurations. Here, we design two different algorithms and provide a full characterization of the initial configurations that permit the resolution of the problems under minimal assumptions. Keywords:
Microbial Life Detection with Minimal Assumptions
"... To produce definitive and unambiguous results, any life detection experiment must make minimal assumptions about the nature of extraterrestrial life. The only criteria that fits this definition is the ability to reproduce and in the process create a disequilibrium in the chemical and redox environme ..."
Abstract
 Add to MetaCart
To produce definitive and unambiguous results, any life detection experiment must make minimal assumptions about the nature of extraterrestrial life. The only criteria that fits this definition is the ability to reproduce and in the process create a disequilibrium in the chemical and redox
On the Minimal Assumptions of Group Signature Schemes
, 2004
"... One of the central lines of cryptographic research is identifying the weakest assumptions required for the construction of secure primitives. In the context of group signatures the gap between what is known to be necessary (oneway functions) and what is known to be sufficient (trapdoor permutat ..."
Abstract

Cited by 3 (0 self)
 Add to MetaCart
One of the central lines of cryptographic research is identifying the weakest assumptions required for the construction of secure primitives. In the context of group signatures the gap between what is known to be necessary (oneway functions) and what is known to be sufficient (trapdoor
Minimal Assumptions for Efficient Mercurial Commitments
, 2005
"... Mercurial commitments were introduced by Chase et al. [8] and form a key building block for constructing zeroknowledge sets (introduced by Micali, Rabin and Kilian [27]). Unlike regular commitments, which are strictly binding, mercurial commitments allow for certain amount of (limited) freedom. T ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
] gave several constructions of mercurial commitments from various incompatible assumptions, leaving open if they can be built from any (trapdoor) commitment scheme, and, in particular, from any oneway function. We give an affirmative answer to this question, by giving two simple constructions
1 Quantum Gravity with Minimal Assumptions
, 2002
"... Several basic results are reviewed on purpose to construct the quantum field theory including gravity, based on physical assumptions as few as possible. Up to now, the work by Steven Weinberg probably suits this purpose the most. Motivated by these results we focus on the fact that the dimension of ..."
Abstract
 Add to MetaCart
Several basic results are reviewed on purpose to construct the quantum field theory including gravity, based on physical assumptions as few as possible. Up to now, the work by Steven Weinberg probably suits this purpose the most. Motivated by these results we focus on the fact that the dimension
Robust ASR with unreliable data and minimal assumptions
 in Proc., Robust’99
, 1999
"... Human speech perception withstands a wide variety of distortions, both experimentally applied and naturallyoccurring. A novel approach to these situations in robust ASR identifies the spectrotemporal regions which carry reliable speech evidence and treats the remainder as missing or uncertain. This ..."
Abstract

Cited by 2 (0 self)
 Add to MetaCart
. This standpoint makes minimal assumptions about any noise background. This paper describes two approaches to the adaptation of continuousdensity hidden Markov modelbased speech recognisers to deal with missing and uncertain acoustic data. The first computes output probabilities on the basis of the reliable
Environmental regulation can arise under minimal assumptions
 Journal of Theoretical Biology
, 2008
"... Abstract Models that demonstrate environmental regulation as a consequence of organism and environment coupling all require a number of core assumptions. Many previous models, such as Daisyworld, require that certain environmentaltering traits have a selective advantage when those traits also cont ..."
Abstract

Cited by 4 (3 self)
 Add to MetaCart
the regulation against mutations that would otherwise destroy it. Sensitivity analysis shows that the regulation is robust to mutation and to a wide range of parameter settings. Given the minimal assumptions employed, the results could reveal a mechanism capable of environmental regulation through the by
Gathering and exclusive searching on rings under minimal assumptions
 In Proc of ICDCN 2014, volume 8314 of LNCS
, 2014
"... Abstract. Consider a set of mobile robots with minimal capabilities placed over distinct nodes of a discrete anonymous ring. Asynchronously, each robot takes a snapshot of the ring, determining which nodes are either occupied by robots or empty. Based on the observed configuration, it decides wheth ..."
Abstract

Cited by 2 (0 self)
 Add to MetaCart
that permit the resolution of the problems under minimal assumptions. 1
LeakageResilient Cryptography from Minimal Assumptions
, 2012
"... We present new constructions of leakageresilient cryptosystems, which remain provably secure even if the attacker learns some arbitrary partial information about their internal secret key. For any polynomial ℓ, we can instantiate these schemes so as to tolerate up to ℓ bits of leakage. While there ..."
Abstract

Cited by 8 (1 self)
 Add to MetaCart
there has been much prior work constructing such leakageresilient cryptosystems under concrete numbertheoretic and algebraic assumptions, we present the first schemes under general and minimal assumptions. In particular, we construct: • Leakageresilient publickey encryption from any standard public
Results 1  10
of
558,723