Sciweavers

3228 search results - page 493 / 646
» Computationally Sound Proofs
Sort
View
COMPUTING
2007
127views more  COMPUTING 2007»
13 years 10 months ago
Analyzing a generalized Loop subdivision scheme
In this paper a class of subdivision schemes generalizing the algorithm of Loop is presented. The stencils have the same support as those from the algorithm of Loop, but allow a v...
Ingo Ginkel, Georg Umlauf
CORR
2007
Springer
124views Education» more  CORR 2007»
13 years 10 months ago
Interpolation in Valiant's theory
We investigate the following question: if a polynomial can be evaluated at rational points by a polynomial-time boolean algorithm, does it have a polynomial-size arithmetic circuit...
Pascal Koiran, Sylvain Perifel
TCOS
2010
13 years 4 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
CVPR
2007
IEEE
15 years 2 days ago
Bilattice-based Logical Reasoning for Human Detection
The capacity to robustly detect humans in video is a critical component of automated visual surveillance systems. This paper describes a bilattice based logical reasoning approach...
Vinay D. Shet, Jan Neumann, Visvanathan Ramesh, La...
STOC
2009
ACM
181views Algorithms» more  STOC 2009»
14 years 10 months ago
The detectability lemma and quantum gap amplification
The quantum analog of a constraint satisfaction problem is a sum of local Hamiltonians - each (term of the) Hamiltonian specifies a local constraint whose violation contributes to...
Dorit Aharonov, Itai Arad, Zeph Landau, Umesh V. V...