Sciweavers

3131 search results - page 575 / 627
» Generalized connection caching
Sort
View
ICALP
2005
Springer
14 years 3 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
MHCI
2005
Springer
14 years 3 months ago
Building social discourse around mobile photos: a systemic perspective
Camera phones have been viewed simplistically as digital cameras with poor picture quality while neglecting the utility of the two key functionalities of mobile phones: network co...
Risto Sarvas, Antti Oulasvirta, Giulio Jacucci
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
14 years 3 months ago
Characterizing Ideal Weighted Threshold Secret Sharing
Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret sharing. In such settings, there is a set of users where each user is assigned a positive w...
Amos Beimel, Tamir Tassa, Enav Weinreb
WLP
2005
Springer
14 years 3 months ago
Meta-S - Combining Solver Cooperation and Programming Languages
Abstract. Meta-S is a constraint solver cooperation system which allows the dynamic integration of arbitrary external (stand-alone) solvers and their combination with declarative l...
Stephan Frank, Petra Hofstedt, Dirk Reckmann
ATAL
2005
Springer
14 years 3 months ago
Discovering strategic multi-agent behavior in a robotic soccer domain
2. THE MASM ALGORITHM An input to the MASM algorithm is a time-annotated multi-agent action sequence. The action sequence is then transformed into an action graph. An action graph ...
Andraz Bezek