Sciweavers

3267 search results - page 577 / 654
» Computational Models of Language Acquisition
Sort
View
ICALP
2005
Springer
14 years 2 months ago
Basing Cryptographic Protocols on Tamper-Evident Seals
Abstract. In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic ope...
Tal Moran, Moni Naor
CC
2004
Springer
115views System Software» more  CC 2004»
14 years 2 months ago
Periodic Polyhedra
This paper presents a new method for computing the integer hull of a parameterized rational polyhedron by introducing the concept of periodic polyhedron. Besides concerning general...
Benoît Meister
CPAIOR
2004
Springer
14 years 2 months ago
Scheduling Abstractions for Local Search
ng Abstractions for Local Search Pascal Van Hentenryck1 and Laurent Michel2 1 Brown University, Box 1910, Providence, RI 02912 2 University of Connecticut, Storrs, CT 06269-3155 Ab...
Pascal Van Hentenryck, Laurent Michel
HUC
2004
Springer
14 years 2 months ago
CAMP: A Magnetic Poetry Interface for End-User Programming of Capture Applications for the Home
As the trend towards technology-enriched home environments progresses, the need to enable users to create applications to suit their own lives increases. While several recent proje...
Khai N. Truong, Elaine M. Huang, Gregory D. Abowd
ICALP
2004
Springer
14 years 2 months ago
Online Scheduling of Equal-Length Jobs: Randomization and Restarts Help
We consider the following scheduling problem. The input is a set of jobs with equal processing times, where each job is specified by its release time and deadline. The goal is to ...
Marek Chrobak, Wojciech Jawor, Jiri Sgall, Tom&aac...