Sciweavers

976 search results - page 74 / 196
» The Complexity of Timetable Construction Problems
Sort
View
CARS
2004
13 years 10 months ago
Vessel segmentation and blood flow simulation using Level-Sets and Embedded Boundary methods
In this article we address the problem of blood flow simulation in realistic vascular objects. The anatomical surfaces are extracted by means of Level-Sets methods that accurately ...
Thomas Deschamps, P. Schwartz, D. Trebotich, P. Co...
COLING
1994
13 years 10 months ago
Adjuncts and the Processing of Lexical Rules
The standard HPSG analysis of Germanic verb clusters can not explain the observed narrowscope readings of adjuncts in such verb clusters. We present an extension of the HPSG analy...
Gertjan van Noord, Gosse Bouma
CORR
2010
Springer
138views Education» more  CORR 2010»
13 years 7 months ago
Feedback control logic synthesis for non safe Petri nets
– This paper addresses the problem of forbidden states of non safe Petri Net (PN) modelling discrete events systems. To prevent the forbidden states, it is possible to use condit...
Abbas Dideban, Hassane Alla
TCC
2009
Springer
130views Cryptology» more  TCC 2009»
14 years 9 months ago
How Efficient Can Memory Checking Be?
We consider the problem of memory checking, where a user wants to maintain a large database on a remote server but has only limited local storage. The user wants to use the small ...
Cynthia Dwork, Moni Naor, Guy N. Rothblum, Vinod V...
ECCC
2007
123views more  ECCC 2007»
13 years 9 months ago
Lossy Trapdoor Functions and Their Applications
We propose a general cryptographic primitive called lossy trapdoor functions (lossy TDFs), and use it to develop new approaches for constructing several important cryptographic to...
Chris Peikert, Brent Waters