Sciweavers

1486 search results - page 98 / 298
» Algorithms for two-box covering
Sort
View
SSWMC
2004
15 years 5 months ago
Quantitative evaluation of pairs and RS steganalysis
We give initial results from a new project which performs statistically accurate evaluation of the reliability of image steganalysis algorithms. The focus here is on the Pairs and...
Andrew D. Ker
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
15 years 1 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
137
Voted
STOC
2007
ACM
146views Algorithms» more  STOC 2007»
16 years 4 months ago
Playing games with approximation algorithms
In an online linear optimization problem, on each period t, an online algorithm chooses st S from a fixed (possibly infinite) set S of feasible decisions. Nature (who may be adve...
Sham M. Kakade, Adam Tauman Kalai, Katrina Ligett
112
Voted
ESWS
2007
Springer
15 years 10 months ago
Semantic Composition of Lecture Subparts for a Personalized e-Learning
Abstract. In this paper we propose an algorithm for personalized learning based on a user’s query and a repository of lecture subparts —i.e., learning objects— both are descr...
Naouel Karam, Serge Linckels, Christoph Meinel
SWAT
1994
Springer
113views Algorithms» more  SWAT 1994»
15 years 8 months ago
Trapezoid Graphs and Generalizations, Geometry and Algorithms
Trapezoid graphs are a class of cocomparability graphs containing interval graphs and permutation graphs as subclasses. They were introduced by Dagan, Golumbic and Pinter DGP]. Th...
Stefan Felsner, Rudolf Müller, Lorenz Wernisc...