254
click to vote
WADS
15 years 10 months ago
2009 Springer
In this paper, we study the two-dimensional geometrical bin packing problem (2DBP): given a list of rectangles, provide a packing of all these into the smallest possible number of ...
150
Voted
STOC
16 years 4 months ago
2009 ACM 249
click to vote
ASIAN
15 years 4 months ago
2009 Springer
Abstract. This paper provides a Hoare-style logic for quantum computation. While the usual Hoare logic helps us to verify classical deterministic programs, our logic supports quant...
143
click to vote
ESA
15 years 10 months ago
2009 Springer
A hash function h, i.e., a function from the set U of all keys to the range range [m] = {0, . . . , m − 1} is called a perfect hash function (PHF) for a subset S ⊆ U of size n ...
180
click to vote
ASIAN
15 years 4 months ago
2009 Springer
In cryptographic protocols, zero knowledge proofs are employed for a principal A to communicate some non-trivial information t to B while at the same time ensuring that B cannot de...
|