Sciweavers

13784 search results - page 2547 / 2757
» On Computing Functions with Uncertainty
Sort
View
COCO
2005
Springer
123views Algorithms» more  COCO 2005»
14 years 2 months ago
If NP Languages are Hard on the Worst-Case Then It is Easy to Find Their Hard Instances
We prove that if NP ⊆ BPP, i.e., if SAT is worst-case hard, then for every probabilistic polynomial-time algorithm trying to decide SAT, there exists some polynomially samplable ...
Dan Gutfreund, Ronen Shaltiel, Amnon Ta-Shma
EDO
2005
Springer
14 years 2 months ago
Experiences in coverage testing of a Java middleware
This paper addresses the issues of test coverage analysis of J2EE servers. These middleware are nowadays at the core of the modern information technology’s landscape. They provi...
Mehdi Kessis, Yves Ledru, Gérard Vandome
EUROCRYPT
2005
Springer
14 years 2 months ago
On Robust Combiners for Oblivious Transfer and Other Primitives
A (1,2)-robust combiner for a cryptographic primitive P is a construction that takes two candidate schemes for P and combines them into one scheme that securely implement P even i...
Danny Harnik, Joe Kilian, Moni Naor, Omer Reingold...
ICMI
2005
Springer
104views Biometrics» more  ICMI 2005»
14 years 2 months ago
Analyzing and predicting focus of attention in remote collaborative tasks
To overcome the limitations of current technologies for remote collaboration, we propose a system that changes a video feed based on task properties, people’s actions, and messa...
Jiazhi Ou, Lui Min Oh, Susan R. Fussell, Tal Blum,...
ICS
2005
Tsinghua U.
14 years 2 months ago
Lightweight reference affinity analysis
Previous studies have shown that array regrouping and structure splitting significantly improve data locality. The most effective technique relies on profiling every access to eve...
Xipeng Shen, Yaoqing Gao, Chen Ding, Roch Archamba...
« Prev « First page 2547 / 2757 Last » Next »