Sciweavers

392 search results - page 40 / 79
» Reversal Complexity Revisited
Sort
View
CCS
2008
ACM
13 years 9 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
ANOR
2008
106views more  ANOR 2008»
13 years 7 months ago
Application of multi-dimensional procurement auction in single-period inventory models
Procurement is one of the major activities in the Manufacturing Resource Planning (MRP II), which is closely coupled with inventory management. Any improvement in this area will h...
Pooya Farahvash, Tayfur Altiok
TCS
2011
13 years 2 months ago
Communication complexity and intrinsic universality in cellular automata
Let F be a cellular automaton (CA). This paper establishes necessary conditions for F in order to be intrinsically universal. The central idea is to consider the communication com...
Eric Goles Chacc, Pierre-Etienne Meunier, Ivan Rap...
ICIP
2005
IEEE
14 years 9 months ago
Image fusion using a new framework for complex wavelet transforms
Image fusion is the process of extracting meaningful visual information from two or more images and combinining them to form one fused image. Image fusion is important within many...
Paul R. Hill, David R. Bull, Cedric Nishan Canagar...
STOC
1993
ACM
134views Algorithms» more  STOC 1993»
13 years 11 months ago
Quantum complexity theory
In this paper we study quantum computation from a complexity theoretic viewpoint. Our first result is the existence of an efficient universal quantum Turing machine in Deutsch’s...
Ethan Bernstein, Umesh V. Vazirani