Sciweavers

27692 search results - page 55 / 5539
» Where is ...
Sort
View
IMA
1997
Springer
88views Cryptology» more  IMA 1997»
14 years 10 days ago
Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains
This paper is concerned with key escrow protocols for use in international communications environments, where communication domains do not necessarily trust one another. It is conc...
Keith M. Martin
APPROX
2008
Springer
99views Algorithms» more  APPROX 2008»
13 years 10 months ago
A 2-Source Almost-Extractor for Linear Entropy
We give an explicit construction of a function that is almost a 2-source extractor for linear entropy, it is a condenser where the output has almost full entropy. Given 2 sources w...
Anup Rao
CCCG
2007
13 years 10 months ago
On the Number of Empty Pseudo-Triangles in Point Sets
We analyze the minimum and maximum number of empty pseudo-triangles defined by any planar point set. We consider the cases where the three convex vertices are fixed and where th...
Marc J. van Kreveld, Bettina Speckmann
CCCG
2004
13 years 10 months ago
On computing enclosing isosceles triangles and related problems
Given a set of n points in the plane, we show how to compute various enclosing isosceles triangles where different parameters such as area or perimeter are optimized. We then stud...
Prosenjit Bose, Carlos Seara, Saurabh Sethia
IJCAI
1989
13 years 10 months ago
Chart Parsing of Flowgraphs
This paper will present a generalisation of chart parsing able to cope with the case where the object being parsed is a particular kind of diagram (a flowgraph) and the grammar is...
Rudi Lutz