Sciweavers

1209 search results - page 172 / 242
» Universal Algebra and Computer Science
Sort
View
ERSHOV
2009
Springer
15 years 6 months ago
Anti-unification Algorithms and Their Applications in Program Analysis
A term t is called a template of terms t1 and t2 iff t1 = t1 and t2 = t2, for some substitutions 1 and 2. A template t of t1 and t2 is called the most specific iff for any template...
Peter E. Bulychev, Egor V. Kostylev, Vladimir A. Z...
PKC
2009
Springer
172views Cryptology» more  PKC 2009»
16 years 3 months ago
CCA-Secure Proxy Re-encryption without Pairings
ded abstract of this paper appears in PKC 2009, S. Jarecki, G. Tsudik (Eds.), volume 5443 of LNCS, pp. 357-376, Sringer-Verlag, 2009. CCA-Secure Proxy Re-Encryption without Pairing...
Jun Shao, Zhenfu Cao
122
Voted
ICALP
1992
Springer
15 years 6 months ago
Near-perfect Token Distribution
Suppose that n tokens are arbitrarily placed on the n nodes of a graph. At each parallel step one token may be moved from each node to an adjacent node. An algorithm for the near-...
Andrei Z. Broder, Alan M. Frieze, Eli Shamir, Eli ...
STOC
1993
ACM
123views Algorithms» more  STOC 1993»
15 years 6 months ago
Constructing small sample spaces satisfying given constraints
Abstract. The subject of this paper is nding small sample spaces for joint distributions of n discrete random variables. Such distributions are often only required to obey a certa...
Daphne Koller, Nimrod Megiddo
134
Voted
PRESENCE
2000
92views more  PRESENCE 2000»
15 years 2 months ago
Virtual Explorer: Interactive Virtual Environment for Education
The Virtual Explorer project of the Senses Bureau at the University of California, San Diego, focuses on creating immersive, highly interactive environments for education and scie...
Kevin L. Dean, Xyler S. Asay-Davis, Evan M. Finn, ...