Sciweavers

2200 search results - page 46 / 440
» Bloch's Constant is Computable
Sort
View
CSR
2009
Springer
15 years 4 months ago
A Feebly Secure Trapdoor Function
Abstract. In 1992, A. Hiltgen [1] provided the first constructions of provably (slightly) secure cryptographic primitives, namely feebly one-way functions. These functions are pro...
Edward A. Hirsch, Sergey I. Nikolenko
CORR
2012
Springer
218views Education» more  CORR 2012»
13 years 5 months ago
On the Hardness of Welfare Maximization in Combinatorial Auctions with Submodular Valuations
We present a new type of monotone submodular functions: multi-peak submodular functions. Roughly speaking, given a family of sets F, we construct a monotone submodular function f ...
Shahar Dobzinski, Jan Vondrák
88
Voted
ISWC
1997
IEEE
15 years 2 months ago
Context-Awareness in Wearable and Ubiquitous Computing
A common focus shared by researchers in mobile, ubiquitous and wearable computing is the attempt to break away from the traditional desktop computing paradigm. Computational servi...
Gregory D. Abowd, Anind K. Dey, Robert Orr, Jason ...
ICPR
2008
IEEE
15 years 4 months ago
Finite element modeling of facial deformation in videos for computing strain pattern
We present a finite element modeling based approach to compute strain patterns caused by facial deformation during expressions in videos. A sparse motion field computed through ...
Vasant Manohar, Matthew Shreve, Dmitry B. Goldgof,...
ITICSE
1996
ACM
15 years 2 months ago
An interactive environment for the teaching of computer architecture
The operation of a computer can be conceptualised as a large, discrete and constantly changing set of state information. However even for the simplest uni-processor the data set o...
Paul S. Coe, Laurence M. Williams, Roland N. Ibbet...