Sciweavers

5665 search results - page 132 / 1133
» Introduction to Computer Security
Sort
View
ASIACRYPT
2008
Springer
13 years 11 months ago
Towards Robust Computation on Encrypted Data
Encryption schemes that support computation on encrypted data are useful in constructing efficient and intuitively simple cryptographic protocols. However, the approach was previo...
Manoj Prabhakaran, Mike Rosulek
MOC
2010
13 years 3 months ago
Computation of conformal representations of compact Riemann surfaces
We find a system of two polynomial equations in two unknowns, whose solution allows us to give an explicit expression of the conformal representation of a simply connected three-sh...
Guillermo López Lagomasino, Domingo Pestana...

Book
9504views
15 years 6 months ago
The OpenGL Programming Guide - The Redbook
"The OpenGL Programming Guide, Fifth Edition, provides definitive and comprehensive information on OpenGL and the OpenGL Utility Library. The previous edition covered OpenGL t...
Dave Shreiner, Mason Woo, Jackie Neider, Tom Davis
TAMC
2007
Springer
14 years 3 months ago
Kernelizations for Parameterized Counting Problems
Abstract. Kernelizations are an important tool in designing fixed parameter algorithms for parameterized decision problems. We introduce an analogous notion for counting problems,...
Marc Thurley
SI3D
1992
ACM
14 years 1 months ago
NPSNET: Constructing a 3D Virtual World
The development of 3D visual simulation systemson inexpensive, commercially available graphics workstations is occurring today and will be commonplace in the near future. Such sys...
Michael Zyda, David R. Pratt, James G. Monahan, Ka...