Sciweavers

504 search results - page 62 / 101
» The Complexity of Symmetry-Breaking Formulas
Sort
View
GMP
2003
IEEE
247views Solid Modeling» more  GMP 2003»
14 years 3 months ago
Message Recovery Signature Scheme Using Complementary Elliptic Curves
Elliptic curve cryptography is known for its complexity due to its discrete logarithm problem, and this gives advantage to the system used since the formula developed using this c...
Teo Chun Yew, Hailiza Kamarulhaili, Putra Sumari
COMPGEOM
2003
ACM
14 years 3 months ago
Restricted delaunay triangulations and normal cycle
We address the problem of curvature estimation from sampled smooth surfaces. Building upon the theory of normal cycles, we derive a definition of the curvature tensor for polyhed...
David Cohen-Steiner, Jean-Marie Morvan
ECSQARU
2003
Springer
14 years 3 months ago
On Iterated Revision in the AGM Framework
While AGM belief revision identifies belief states with sets of formulas, proposals for iterated revision are usually based on more complex belief states. In this paper we investi...
Andreas Herzig, Sébastien Konieczny, Lauren...
CDC
2009
IEEE
111views Control Systems» more  CDC 2009»
14 years 2 months ago
Restricted real perturbation values with applications to the structured real controllability radius of LTI systems
Abstract— In this paper, the concept of restricted real perturbation values of a complex matrix triplet is introduced, and a formula for computing lower bounds of these values is...
Simon Lam, Edward J. Davison
ISMVL
1999
IEEE
90views Hardware» more  ISMVL 1999»
14 years 2 months ago
Transformations between Signed and Classical Clause Logic
In the last years two automated reasoning techniques for clause normal form arose in which the use of labels are prominently featured: signed logic and annotated logic programming...
Bernhard Beckert, Reiner Hähnle, Felip Many&a...