Sciweavers

986 search results - page 85 / 198
» Generalized Goal Programming: polynomial methods and applica...
Sort
View
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
14 years 2 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
ICALP
2001
Springer
14 years 1 months ago
Approximation Algorithms for Partial Covering Problems
We study the generalization of covering problems to partial covering. Here we wish to cover only a desired number of elements, rather than covering all elements as in standard cov...
Rajiv Gandhi, Samir Khuller, Aravind Srinivasan
AVSS
2005
IEEE
14 years 2 months ago
Multi-camera positioning to optimize task observability
The performance of computer vision systems for measurement, surveillance, reconstruction, gait recognition, and many other applications, depends heavily on the placement of camera...
Robert Bodor, Paul R. Schrater, Nikolaos Papanikol...
ASPLOS
1992
ACM
14 years 1 months ago
Efficient Superscalar Performance Through Boosting
The foremost goal of superscalar processor design is to increase performance through the exploitation of instruction-level parallelism (ILP). Previous studies have shown that spec...
Michael D. Smith, Mark Horowitz, Monica S. Lam
APL
1993
ACM
14 years 1 months ago
Array Morphology
Array morphology is the study of the form, structure, and evolution of arrays. An array annotation for a program written in an applicative array lanan abstract syntax tree for the...
Robert Bernecky