Sciweavers

2430 search results - page 81 / 486
» Computing Tutte Polynomials
Sort
View
CRYPTO
2001
Springer
144views Cryptology» more  CRYPTO 2001»
15 years 7 months ago
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
In this paper we show that any two-party functionality can be securely computed in a constant number of rounds, where security is obtained against malicious adversaries that may ar...
Yehuda Lindell
116
Voted
ALENEX
2004
116views Algorithms» more  ALENEX 2004»
15 years 4 months ago
A Computational Framework for Handling Motion
We present a framework for implementing geometric algorithms involving motion. It is written in C++ and modeled after and makes extensive use of CGAL (Computational Geometry Algor...
Leonidas J. Guibas, Menelaos I. Karavelas, Daniel ...
109
Voted
ICASSP
2008
IEEE
15 years 9 months ago
Efficient computation of the binary vector that maximizes a rank-deficient quadratic form
The maximization of a full-rank quadratic form over a finite alphabet is NP-hard in both a worst-case sense and an average sense. Interestingly, if the rank of the form is not a ...
George N. Karystinos, Athanasios P. Liavas
ADG
2006
Springer
177views Mathematics» more  ADG 2006»
15 years 8 months ago
Recognition of Computationally Constructed Loci
Abstract. We propose an algorithm for automated recognition of computationally constructed curves and discuss several aspects of the recognition problem. Recognizing loci means det...
Peter Lebmeir, Jürgen Richter-Gebert
CORR
2000
Springer
81views Education» more  CORR 2000»
15 years 2 months ago
Poly-locality in quantum computing
A polynomial depth quantum circuit affects, by definition, a poly-local unitary transformation of a tensor product state space. It is a reasonable belief [Fe], [L], [FKW] that, at ...
Michael H. Freedman