Sciweavers

2542 search results - page 133 / 509
» One step ahead
Sort
View
CRYPTO
2003
Springer
109views Cryptology» more  CRYPTO 2003»
14 years 2 months ago
Weak Key Authenticity and the Computational Completeness of Formal Encryption
Abstract. A significant effort has recently been made to rigorously relate the formal treatment of cryptography with the computational one. A first substantial step in this dire...
Omer Horvitz, Virgil D. Gligor
EWMF
2003
Springer
14 years 2 months ago
Greedy Recommending Is Not Always Optimal
Abstract. Recommender systems suggest objects to users. One form recommends documents or other objects to users searching information on a web site. A recommender system can be use...
Maarten van Someren, Vera Hollink, Stephan ten Hag...
ICRA
2002
IEEE
102views Robotics» more  ICRA 2002»
14 years 2 months ago
Images Interpolation for Image-Based Control under Large Displacement
The principal deficiency of image-based visual servoing is that the induced (3D) trajectories are not optimal and sometimes, especially when the displacement to realize is large,...
Youcef Mezouar, Anthony Remazeilles, Patrick Gros,...
CIA
2001
Springer
14 years 1 months ago
Cryptographic Protocols for Secure Second-Price Auctions
In recent years auctions have become more and more important in the field of multiagent systems as useful mechanisms for resource allocation, task assignment and last but not leas...
Felix Brandt
IPPS
2000
IEEE
14 years 1 months ago
Take Advantage of the Computing Power of DNA Computers
Ever since Adleman [1] solved the Hamilton Path problem using a combinatorial molecular method, many other hard computational problems have been investigated with the proposed DNA ...
Zhiquan Frank Qiu, Mi Lu