Sciweavers

35419 search results - page 172 / 7084
» How are we doing
Sort
View
CRYPTO
2004
Springer
139views Cryptology» more  CRYPTO 2004»
15 years 9 months ago
How to Compress Rabin Ciphertexts and Signatures (and More)
Ordinarily, RSA and Rabin ciphertexts and signatures are log N bits, where N is a composite modulus; here, we describe how to “compress” Rabin ciphertexts and signatures (among...
Craig Gentry
ASE
2007
83views more  ASE 2007»
15 years 4 months ago
How knowledge representation meets software engineering (and often databases)
This paper surveys a selection of personal research projects which addressed problems related to Software Engineering, and whose solution was inspired by ideas from the field of K...
Alexander Borgida
ACL
2012
13 years 6 months ago
You Had Me at Hello: How Phrasing Affects Memorability
Understanding the ways in which information achieves widespread public awareness is a research question of significant interest. We consider whether, and how, the way in which th...
Cristian Danescu-Niculescu-Mizil, Justin Cheng, Jo...
AGP
2010
IEEE
15 years 7 months ago
Agents, Multi-Agent Systems and Declarative Programming: What, When, Where, Why, Who, How?
This chapter tackles the relation between declarative languages and multi-agent systems by following the dictates of the five Ws (and one H) that characterize investigations. The ...
Matteo Baldoni, Cristina Baroglio, Viviana Mascard...
ICCV
2003
IEEE
16 years 6 months ago
How To Deal with Point Correspondences and Tangential Velocities in the Level Set Framework
In this paper, we overcome a major drawback of the level set framework: the lack of point correspondences. We maintain explicit backward correspondences from the evolving interfac...
Jean-Philippe Pons, Gerardo Hermosillo, Renaud Ker...