Sciweavers

524 search results - page 71 / 105
» ets 2010
Sort
View
CTRSA
2010
Springer
232views Cryptology» more  CTRSA 2010»
14 years 2 months ago
On Extended Sanitizable Signature Schemes
Sanitizable signature schemes allow a semi-trusted entity to modify some specific portions of a signed message while keeping a valid signature of the original off-line signer. In...
Sébastien Canard, Amandine Jambert
LATIN
2010
Springer
14 years 2 months ago
Layered Working-Set Trees
The working-set bound [Sleator and Tarjan, J. ACM, 1985] roughly states that searching for an element is fast if the element was accessed recently. Binary search trees, such as sp...
Prosenjit Bose, Karim Douïeb, Vida Dujmovic, ...
EVOW
2010
Springer
14 years 2 months ago
Investigating the Local-Meta-Model CMA-ES for Large Population Sizes
For many real-life engineering optimization problems, the cost of one objective function evaluation can take several minutes or hours. In this context, a popular approach to reduce...
Zyed Bouzarkouna, Anne Auger, Didier Yu Ding
LATIN
2010
Springer
14 years 21 days ago
Euclidean Prize-Collecting Steiner Forest
In this paper, we consider Steiner forest and its generalizations, prize-collecting Steiner forest and k-Steiner forest, when the vertices of the input graph are points in the Euc...
MohammadHossein Bateni, MohammadTaghi Hajiaghayi
NPAR
2010
ACM
14 years 20 days ago
Diffusion constraints for vector graphics
The formulation of Diffusion Curves [Orzan et al. 2008] allows for the flexible creation of vector graphics images from a set of curves and colors: a diffusion process fills out...
Hedlena Bezerra, Elmar Eisemann, Doug DeCarlo, Jo&...