Sciweavers

280 search results - page 47 / 56
» see 2010
Sort
View
FUN
2010
Springer
263views Algorithms» more  FUN 2010»
14 years 2 months ago
Fighting Censorship with Algorithms
In countries such as China or Iran where Internet censorship is prevalent, users usually rely on proxies or anonymizers to freely access the web. The obvious difficulty with this a...
Mohammad Mahdian
STOC
2010
ACM
220views Algorithms» more  STOC 2010»
14 years 1 months ago
Combinatorial approach to the interpolation method and scaling limits in sparse random graphs
We establish the existence of free energy limits for several sparse random hypergraph models corresponding to certain combinatorial models on Erd¨os-R´enyi graph G(N, c/N) and r...
Mohsen Bayati, David Gamarnik, Prasad Tetali
CSFW
2010
IEEE
14 years 1 months ago
A Framework for the Sound Specification of Cryptographic Tasks
Nowadays it is widely accepted to formulate the security of a protocol carrying out a given task via the "trusted-party paradigm," where the protocol execution is compar...
Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou
APGV
2010
ACM
301views Visualization» more  APGV 2010»
14 years 1 months ago
Egocentric distance judgments in a large screen display immersive virtual environment
People underestimate egocentric distances in head-mounted display virtual environments, as compared to estimates done in the real world. Our work investigates whether distances ar...
Ivelina V. Alexandrova, Paolina T. Teneva, Stephan...
VDA
2010
206views Visualization» more  VDA 2010»
14 years 10 days ago
Visual discovery in multivariate binary data
This paper presents the concept of Monotone Boolean Function Visual Analytics (MBFVA) and its application to the medical domain. The medical application is concerned with discover...
Boris Kovalerchuk, Florian Delizy, Logan Riggs, Ev...