Sciweavers

1249 search results - page 75 / 250
» Limitations of the Even-Mansour Construction
Sort
View
SODA
2012
ACM
217views Algorithms» more  SODA 2012»
12 years 13 days ago
Polynomial integrality gaps for strong SDP relaxations of Densest k-subgraph
The Densest k-subgraph problem (i.e. find a size k subgraph with maximum number of edges), is one of the notorious problems in approximation algorithms. There is a significant g...
Aditya Bhaskara, Moses Charikar, Aravindan Vijayar...
CTRSA
2010
Springer
232views Cryptology» more  CTRSA 2010»
14 years 4 months ago
On Extended Sanitizable Signature Schemes
Sanitizable signature schemes allow a semi-trusted entity to modify some specific portions of a signed message while keeping a valid signature of the original off-line signer. In...
Sébastien Canard, Amandine Jambert
ICDCS
2007
IEEE
14 years 4 months ago
Scale-Free Overlay Topologies with Hard Cutoffs for Unstructured Peer-to-Peer Networks
In unstructured peer-to-peer (P2P) networks, the overlay topology (or connectivity graph) among peers is a crucial component in addition to the peer/data organization and search. ...
Hasan Guclu, Murat Yuksel
3DPVT
2006
IEEE
179views Visualization» more  3DPVT 2006»
14 years 4 months ago
Large-Scale Urban Modeling by Combining Ground Level Panoramic and Aerial Imagery
We describe an interactive system that models regions of an urban environment, such as a group of tall buildings. Traditional image-based modeling methods often cannot model such ...
Lu Wang, Suya You, Ulrich Neumann
VISSOFT
2005
IEEE
14 years 3 months ago
Interactive Exploration of UML Sequence Diagrams
Sequence diagrams are commonly used to represent object interactions in software systems. Reverse-engineered sequence diagrams, which are constructed from existing code, are becom...
Richard Sharp, Atanas Rountev