Sciweavers

1893 search results - page 144 / 379
» Computational composites
Sort
View
138
Voted
JCS
2010
112views more  JCS 2010»
15 years 3 months ago
Inductive trace properties for computational security
Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
102
Voted
ICRA
2009
IEEE
101views Robotics» more  ICRA 2009»
15 years 11 months ago
Global vector field computation for feedback motion planning
— We present a global vector field computation algorithm in configuration spaces for smooth feedback motion planning. Our algorithm performs approximate cell decomposition in t...
Liangjun Zhang, Steven M. LaValle, Dinesh Manocha
135
Voted
EUROCRYPT
2007
Springer
15 years 8 months ago
Round-Efficient Secure Computation in Point-to-Point Networks
Essentially all work studying the round complexity of secure computation assumes broadcast as an atomic primitive. Protocols constructed under this assumption tend to have very poo...
Jonathan Katz, Chiu-Yuen Koo
HT
2009
ACM
15 years 11 months ago
The redocumentation process of computer mediated activity traces: a general framework
The digital world enables the creation of personalized documents. In this paper we are interested in describing a computer mediated activity by a person throughout a semi-automati...
Leila Yahiaoui, Yannick Prié, Zizette Boufa...
140
Voted
BIRD
2008
Springer
158views Bioinformatics» more  BIRD 2008»
15 years 6 months ago
A Computational Method for Reconstructing Gapless Metabolic Networks
Abstract. We propose a computational method for reconstructing metabolic networks. The method utilizes optimization techniques and graph traversal algorithms to discover a set of b...
Esa Pitkänen, Ari Rantanen, Juho Rousu, Esko ...