Sciweavers

886 search results - page 68 / 178
» Generalized Bezout Identity
Sort
View
TCC
2005
Springer
118views Cryptology» more  TCC 2005»
14 years 2 months ago
On the Relationships Between Notions of Simulation-Based Security
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. Th...
Anupam Datta, Ralf Küsters, John C. Mitchell,...
WG
2005
Springer
14 years 2 months ago
Algebraic Operations on PQ Trees and Modular Decomposition Trees
Partitive set families are families of sets that can be quite large, but have a compact, recursive representation in the form of a tree. This tree is a common generalization of PQ...
Ross M. McConnell, Fabien de Montgolfier
CSCW
2004
ACM
14 years 2 months ago
Hiding and revealing in online poker games
Poker is largely a game of social and psychological information. However, online card room interfaces do not support the subtle communication between players that is integral to t...
Scott A. Golder, Judith S. Donath
ADG
2004
Springer
189views Mathematics» more  ADG 2004»
14 years 2 months ago
nD Polyhedral Scene Reconstruction from Single 2D Line Drawing by Local Propagation
In this paper, we study the problem of reconstructing the polyhedral structures and geometric positions of a general nD polyhedral scene from a single 2D line drawing. With the ide...
Hongbo Li
CIKM
2004
Springer
14 years 2 months ago
Mining gene expression datasets using density-based clustering
Given the recent advancement of microarray technologies, we present a density-based clustering approach for the purpose of co-expressed gene cluster identification. The underlyin...
Seokkyung Chung, Jongeun Jun, Dennis McLeod