Results 91 to 100 of about 106,354 (248)

Robo‐Saber: Generating and Simulating Virtual Reality Players

open access: yesComputer Graphics Forum, EarlyView.
Abstract We present the first motion generation system for playtesting virtual reality (VR) games. Our player model generates VR headset and handheld controller movements from in‐game object arrangements, guided by style reference gameplay examples. We train on the large BOXRR‐23 dataset and apply our framework on the popular VR game Beat Saber.
N. H. Kim   +5 more
wiley   +1 more source

A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM [PDF]

open access: yes, 2017
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation.
Barreto, Paulo S. L. M.   +4 more
core   +1 more source

OUGS: Active View Selection via Object‐aware Uncertainty Estimation in 3DGS

open access: yesComputer Graphics Forum, EarlyView.
Abstract Recent advances in 3D Gaussian Splatting (3DGS) have achieved state‐of‐the‐art results for novel view synthesis. However, efficiently capturing high‐fidelity reconstructions of specific objects within complex scenes remains a significant challenge.
Haiyi Li   +3 more
wiley   +1 more source

Contouring Signed Distance Fields by Approximating Gradients

open access: yesComputer Graphics Forum, EarlyView.
Abstract Signed distance fields are often represented by discrete samples (e.g., on a grid). Recovering the contour implicitly represented by the distance samples requires an approximation algorithm. Several recent approaches have shown that exploiting the information carried in each distance sample by explicitly constructing a surface point gives ...
M. Kohlbrenner, M. Alexa
wiley   +1 more source

On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services

open access: yesIEEE Access, 2017
Secure and efficient lightweight user authentication protocol for mobile cloud computing becomes a paramount concern due to the data sharing using Internet among the end users and mobile devices.
Sandip Roy   +5 more
doaj   +1 more source

Assessing Risk for Bycatch and Byproduct Species Using a Modified Sustainability Assessment for Fishing Effects (SAFE) Approach

open access: yesFish and Fisheries, EarlyView.
ABSTRACT Central to ecosystem‐based fisheries management is ensuring the sustainability of bycatch and byproduct species. However, the sustainability of these species is difficult to assess as the lack of information limits the use of traditional stock assessment methods.
Grant J. Johnson   +5 more
wiley   +1 more source

Miners' Reward Elasticity and Stability of Competing Proof‐of‐Work Cryptocurrencies

open access: yesInternational Economic Review, EarlyView.
ABSTRACT Proof‐of‐Work cryptocurrencies employ miners to sustain the system through algorithmic reward adjustments. We develop a stochastic model of the multicurrency mining and identify conditions for stable transaction speeds. Bitcoin's algorithm requires hash supply elasticity <$<$1 for stability, while ASERT remains stable for any elasticity and ...
Kohei Kawaguchi   +2 more
wiley   +1 more source

Instantiating Random Oracles via UCEs [PDF]

open access: yes, 2013
This paper provides a (standard-model) notion of security for (keyed) hash functions, called UCE, that we show enables instantiation of random oracles (ROs) in a fairly broad and systematic way. Goals and schemes we consider include deterministic PKE; message-locked encryption; hardcore functions; point-function obfuscation; OAEP; encryption secure for
Mihir Bellare   +2 more
openaire   +1 more source

Medical Knowledge Integration Into Reinforcement Learning Algorithms for Dynamic Treatment Regimes

open access: yesInternational Statistical Review, EarlyView.
Summary The goal of precision medicine is to provide individualised treatment at each stage of chronic diseases, a concept formalised by dynamic treatment regimes (DTR). These regimes adapt treatment strategies based on decision rules learned from clinical data to enhance therapeutic effectiveness.
Sophia Yazzourh   +3 more
wiley   +1 more source

Permutation-Based Hash Chains with Application to Password Hashing

open access: yesIACR Transactions on Symmetric Cryptology
Hash chain based password systems are a useful way to guarantee authentication with one-time passwords. The core idea dates back to Lamport, and is specified in RFC 1760 as S/Key. At CCS 2017, Kogan et al.
Charlotte Lefevre, Bart Mennink
doaj   +1 more source

Home - About - Disclaimer - Privacy