Sciweavers

5665 search results - page 132 / 1133
» Introduction to Computer Security
Sort
View
ASIACRYPT
2008
Springer
15 years 4 months ago
Towards Robust Computation on Encrypted Data
Encryption schemes that support computation on encrypted data are useful in constructing efficient and intuitively simple cryptographic protocols. However, the approach was previo...
Manoj Prabhakaran, Mike Rosulek
101
Voted
MOC
2010
14 years 9 months ago
Computation of conformal representations of compact Riemann surfaces
We find a system of two polynomial equations in two unknowns, whose solution allows us to give an explicit expression of the conformal representation of a simply connected three-sh...
Guillermo López Lagomasino, Domingo Pestana...
284
Voted

Book
9504views
17 years 14 min ago
The OpenGL Programming Guide - The Redbook
"The OpenGL Programming Guide, Fifth Edition, provides definitive and comprehensive information on OpenGL and the OpenGL Utility Library. The previous edition covered OpenGL t...
Dave Shreiner, Mason Woo, Jackie Neider, Tom Davis
117
Voted
TAMC
2007
Springer
15 years 8 months ago
Kernelizations for Parameterized Counting Problems
Abstract. Kernelizations are an important tool in designing fixed parameter algorithms for parameterized decision problems. We introduce an analogous notion for counting problems,...
Marc Thurley
SI3D
1992
ACM
15 years 6 months ago
NPSNET: Constructing a 3D Virtual World
The development of 3D visual simulation systemson inexpensive, commercially available graphics workstations is occurring today and will be commonplace in the near future. Such sys...
Michael Zyda, David R. Pratt, James G. Monahan, Ka...