Sciweavers

504 search results - page 50 / 101
» The Complexity of Symmetry-Breaking Formulas
Sort
View
ASIACRYPT
2005
Springer
14 years 3 months ago
Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation
We propose Gate Evaluation Secret Sharing (GESS) – a new kind of secret sharing, designed for use in secure function evaluation (SFE) with minimal interaction. The resulting simp...
Vladimir Kolesnikov
ISCIS
2005
Springer
14 years 3 months ago
An Investigation of the Course-Section Assignment Problem
Abstract. We investigate the problem of enumerating schedules, consisting of course-section assignments, in increasing order of the number of conflicts they contain. We define th...
Zeki Bayram
AMAI
2004
Springer
14 years 3 months ago
Unrestricted vs Restricted Cut in a Tableau Method for Boolean Circuits
This paper studies the relative proof complexity of variations of a tableau method for Boolean circuit satisfiability checking obtained by restricting the use of the cut rule in s...
Matti Järvisalo, Tommi A. Junttila, Ilkka Nie...
CONCUR
2004
Springer
14 years 3 months ago
Model Checking Restricted Sets of Timed Paths
In this paper, we study the complexity of model-checking formulas of three important real-time logics (MTL, MITL, and TCTL) over restricted sets of timed paths. The classes of rest...
Nicolas Markey, Jean-François Raskin
RSCTC
2004
Springer
110views Fuzzy Logic» more  RSCTC 2004»
14 years 3 months ago
A Graded Applicability of Rules
We address the problem of rough applicability of rules within the framework of approximation spaces. The graded applicability of a rule for an object of an approximation space, int...
Anna Gomolinska