165
click to vote
IJIT
15 years 1 months ago
2004
Cryptarithmetic problem is an interesting constraint satisfaction problem for which different algorithms have been given. But none of them can solve the problem intelligently using...
152
Voted
TCC
15 years 5 months ago
2004 Springer
Abstract. We investigate whether it is possible to obtain any meaningful type of zero-knowledge proofs using a one-message (i.e., noninteractive) proof system. We show that, under ...
166
Voted
ECCV
16 years 2 months ago
2004 Springer
Abstract. We study an energy functional for computing optical flow that combines three assumptions: a brightness constancy assumption, a gradient constancy assumption, and a discon...
132
Voted
ICPR
16 years 1 months ago
2004 IEEE 120
Voted
OSDI
16 years 15 days ago
2004 ACM
Copy-pasted code is very common in large software because programmers prefer reusing code via copy-paste in order to reduce programming effort. Recent studies show that copy-paste...
|