Public-key cryptosystems generally involve computation-intensive arithmetic operations, making them impractical for software implementation on constrained devices such as smart ca...
We consider the problem of counting the number of spanning trees in planar graphs. We prove tight bounds on the complexity of the problem, both in general and especially in the mo...
The radiation (reactive or Robin) boundary condition for the diffusion equation is widely used in chemical and biological applications to express reactive boundaries. The underlyin...
Human values can help to explain people’s sentiment toward current events. In this experiment, we compare people’s values with their agreement or disagreement with paragraphs ...
Thomas Clay Templeton, Kenneth R. Fleischmann, Jor...
We investigate bivariate pointing in light of the recent progress in the modeling of univariate pointing. Unlike previous studies, we focus on the effect of target shape (width an...