Sciweavers

2208 search results - page 333 / 442
» On Issues of Instance Selection
Sort
View
132
Voted
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
15 years 9 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani
127
Voted
WAOA
2005
Springer
152views Algorithms» more  WAOA 2005»
15 years 9 months ago
Symmetry in Network Congestion Games: Pure Equilibria and Anarchy Cost
We study computational and coordination efficiency issues of Nash equilibria in symmetric network congestion games. We first propose a simple and natural greedy method that comput...
Dimitris Fotakis, Spyros C. Kontogiannis, Paul G. ...
109
Voted
AFRIGRAPH
2004
ACM
15 years 9 months ago
Direct HDR capture of the sun and sky
We present a technique for capturing the extreme dynamic range of natural illumination environments that include the sun and sky, which has presented a challenge for traditional h...
Jessi Stumpfel, Chris Tchou, Andrew Jones, Tim Haw...
122
Voted
SAC
2004
ACM
15 years 9 months ago
Classifying biological articles using web resources
Text classification systems on biomedical literature aim to select relevant articles to a specific issue from large corpora. Most systems with an acceptable accuracy are based o...
Francisco M. Couto, Bruno Martins, Mário J....
114
Voted
UIST
2004
ACM
15 years 9 months ago
Collapse-to-zoom: viewing web pages on small screen devices by interactively removing irrelevant content
Overview visualizations for small-screen web browsers were designed to provide users with visual context and to allow them to rapidly zoom in on tiles of relevant content. Given t...
Patrick Baudisch, Xing Xie, Chong Wang 0002, Wei-Y...