Sciweavers

882 search results - page 84 / 177
» Visibility-driven transfer functions
Sort
View
TCC
2009
Springer
133views Cryptology» more  TCC 2009»
14 years 9 months ago
Composing Quantum Protocols in a Classical Environment
We propose a general security definition for cryptographic quantum protocols that implement classical non-reactive two-party tasks. The definition is expressed in terms of simple q...
Serge Fehr, Christian Schaffner
RECOMB
2002
Springer
14 years 9 months ago
Tests for gene clustering
Comparing chromosomal gene order in two or more related species is an important approach to studying the forces that guide genome organization and evolution. Linked clusters of si...
Dannie Durand, David Sankoff
SAT
2009
Springer
153views Hardware» more  SAT 2009»
14 years 3 months ago
Does Advice Help to Prove Propositional Tautologies?
One of the starting points of propositional proof complexity is the seminal paper by Cook and Reckhow [6], where they defined propositional proof systems as poly-time computable f...
Olaf Beyersdorff, Sebastian Müller
PG
2007
IEEE
14 years 3 months ago
Precomputed Visibility Cuts for Interactive Relighting with Dynamic BRDFs
This paper presents a novel PRT-based method that uses precomputed visibility cuts for interactive relighting with all-frequency environment maps and arbitrary dynamic BRDFs. Our ...
Oskar Åkerlund, Mattias Unger, Rui Wang
INFOCOM
2006
IEEE
14 years 3 months ago
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
Skype is a peer-to-peer VoIP client developed by KaZaa in 2003. Skype claims that it can work almost seamlessly across NATs and firewalls and has better voice quality than the MSN...
Salman Baset, Henning Schulzrinne