Sciweavers

1653 search results - page 273 / 331
» Computer science and game theory
Sort
View
STACS
2010
Springer
14 years 6 months ago
Mathematics, Cryptology, Security
Abstract. In this talk, I will review some of the work performed by the research community in cryptology and security since the invention of public key cryptography by Diffie and H...
Jacques Stern
FOCS
2005
IEEE
14 years 4 months ago
A Characterization of the (natural) Graph Properties Testable with One-Sided Error
The problem of characterizing all the testable graph properties is considered by many to be the most important open problem in the area of property-testing. Our main result in thi...
Noga Alon, Asaf Shapira
CHI
2008
ACM
14 years 11 months ago
A resource kit for participatory socio-technical design in rural Kenya
We describe our approach and initial results in the participatory design of technology relevant to local rural livelihoods. Our approach to design and usability proceeds from rese...
Kevin Walker, Joshua Underwood, Timothy Mwololo Wa...
IPPS
2007
IEEE
14 years 5 months ago
From Hardware to Software Synthesis of Linear Feedback Shift Registers
Linear Feedback Shift Registers (LFSRs) have always received considerable attention in computer science especially in coding theory and in cryptography. The scope of applications ...
Cédric Lauradoux
SIGCSE
2006
ACM
147views Education» more  SIGCSE 2006»
14 years 5 months ago
Image understanding as a second course in AI: preparing students for research
This paper describes the development and structure of a second course in artificial intelligence that was developed to meet the needs of upper-division undergraduate and graduate ...
Roxanne L. Canosa