Sciweavers

297 search results - page 29 / 60
» J-MADeM, a market-based model for complex decision problems
Sort
View
COMPGEOM
2011
ACM
12 years 11 months ago
Deconstructing approximate offsets
We consider the offset-deconstruction problem: Given a polygonal shape Q with n vertices, can it be expressed, up to a tolerance ε in Hausdorff distance, as the Minkowski sum o...
Eric Berberich, Dan Halperin, Michael Kerber, Roza...
WSC
2004
13 years 9 months ago
Military Applications of Agent-Based Simulations
There continues to be increasing interest from a broad range of disciplines in agent-based and artificial life simulations. This includes the Department of Defense--which uses sim...
Thomas M. Cioppa, Thomas W. Lucas, Susan M. Sanche...
WSC
1998
13 years 9 months ago
Getting Started in Simulation in Healthcare
To begin using simulation in healthcare, one must first recognize the types of problems or decisions that can best be analyzed using simulation. Once a problem has been identified...
Julie C. Lowery
CRYPTO
2006
Springer
224views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the...
Xavier Boyen, Brent Waters
AAAI
2007
13 years 10 months ago
Reasoning about Attribute Authenticity in a Web Environment
The reliable authentication of user attributes is an important prerequisite for the security of web based applications. Digital certificates are widely used for that purpose. How...
Thomas Wölfl