Sciweavers

563 search results - page 112 / 113
» A Typing Scheme for Behavioural Models
Sort
View
SODA
2003
ACM
114views Algorithms» more  SODA 2003»
13 years 8 months ago
Lower bounds for collusion-secure fingerprinting
Collusion-secure fingerprinting codes are an important primitive used by many digital watermarking schemes [1, 10, 9]. Boneh and Shaw [3] define a model for these types of codes...
Chris Peikert, Abhi Shelat, Adam Smith
CGF
2008
201views more  CGF 2008»
13 years 7 months ago
High-Resolution Volumetric Computation of Offset Surfaces with Feature Preservation
We present a new algorithm for the efficient and reliable generation of offset surfaces for polygonal meshes. The algorithm is robust with respect to degenerate configurations and...
Darko Pavic, Leif Kobbelt
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 7 months ago
Sequential item pricing for unlimited supply
We investigate the extent to which price updates can increase the revenue of a seller with little prior information on demand. We study prior-free revenue maximization for a selle...
Maria-Florina Balcan, Florin Constantin
JSAC
2006
167views more  JSAC 2006»
13 years 7 months ago
Secure and resilient clock synchronization in wireless sensor networks
Abstract--Wireless sensor networks have received a lot of attention recently due to its wide applications. An accurate and synchronized clock time is crucial in many sensor network...
Kun Sun, Peng Ning, Cliff Wang
BMCBI
2005
125views more  BMCBI 2005»
13 years 7 months ago
Multiple sequence alignments of partially coding nucleic acid sequences
Background: High quality sequence alignments of RNA and DNA sequences are an important prerequisite for the comparative analysis of genomic sequence data. Nucleic acid sequences, ...
Roman R. Stocsits, Ivo L. Hofacker, Claudia Fried,...