Abstract. Different security notions and settings for identification protocols have been proposed so far, considering different powerful adversaries that can play "man-in-the-...
Carlo Blundo, Giuseppe Persiano, Ahmad-Reza Sadegh...
Every simple planar polygon can undergo only a finite number of pocket flips before becoming convex. Since Erdos posed this as an open problem in 1935, several independent purport...
Erik D. Demaine, Blaise Gassend, Joseph O'Rourke, ...
Clustering streaming data requires algorithms which are capable of updating clustering results for the incoming data. As data is constantly arriving, time for processing is limited...
Philipp Kranen, Ira Assent, Corinna Baldauf, Thoma...
The random k-SAT model is extensively used to compare satisfiability algorithms or to find the best settings for the parameters of some algorithm. Conclusions are derived from the...
Adapting training methods to specific teacher traits to best facilitate the training effects for preservice teachers is an important, yet neglected, topic in aptitude-treatment in...