277
Voted
WADS
15 years 11 months ago
2009 Springer
In this paper, we study the two-dimensional geometrical bin packing problem (2DBP): given a list of rectangles, provide a packing of all these into the smallest possible number of ...
164
Voted
STOC
16 years 5 months ago
2009 ACM 274
Voted
ASIAN
15 years 6 months ago
2009 Springer
Abstract. This paper provides a Hoare-style logic for quantum computation. While the usual Hoare logic helps us to verify classical deterministic programs, our logic supports quant...
160
Voted
ESA
15 years 11 months ago
2009 Springer
A hash function h, i.e., a function from the set U of all keys to the range range [m] = {0, . . . , m − 1} is called a perfect hash function (PHF) for a subset S ⊆ U of size n ...
198
Voted
ASIAN
15 years 6 months ago
2009 Springer
In cryptographic protocols, zero knowledge proofs are employed for a principal A to communicate some non-trivial information t to B while at the same time ensuring that B cannot de...
|