Sciweavers

2059 search results - page 342 / 412
» A Directed Threshold - Signature Scheme
Sort
View
DEDUCTIVE
1997
119views Database» more  DEDUCTIVE 1997»
15 years 5 months ago
Inheritance with Overriding Without Non-monotonic Reasoning in Datalog++
We present a query language, called the Datalog++ , for deductive object-oriented databases. While a direct semantics for inheritance with overriding and encapsulation is desirabl...
Hasan M. Jamil
OSDI
1994
ACM
15 years 5 months ago
Implementation and Performance of Application-Controlled File Caching
Traditional le system implementations do not allow applications to control le caching replacement decisions. We have implemented two-level replacement, a scheme that allows appl...
Pei Cao, Edward W. Felten, Kai Li
VMV
2007
219views Visualization» more  VMV 2007»
15 years 5 months ago
GPU Rendering of Secondary Effects
In this paper we present an efficient data structure and algorithms for GPU ray tracing of secondary effects like reflections, refractions and shadows. Our method extends previo...
Kai Bürger, Stefan Hertel, Jens Krüger, ...
BILDMED
2009
143views Algorithms» more  BILDMED 2009»
15 years 5 months ago
Landmark Constrained Non-parametric Image Registration with Isotropic Tolerances
Abstract. The incorporation of additional user knowledge into a nonrigid registration process is a promising topic in modern registration schemes. The combination of intensity base...
Nils Papenberg, Janine Olesch, Thomas Lange, Peter...
CRYPTO
2010
Springer
158views Cryptology» more  CRYPTO 2010»
15 years 5 months ago
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography
Motivated by the question of basing cryptographic protocols on stateless tamper-proof hardware tokens, we revisit the question of unconditional two-prover zero-knowledge proofs fo...
Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit ...