Since the link structure of the web is an important element in ranking systems on search engines, web spammers widely use the link structure of the web to increase the rank of the...
Reid Andersen, Christian Borgs, Jennifer T. Chayes...
Abstract— The paper deals with computing frictional forceclosure grasps of 3D objects problem. The key idea of the presented work is the demonstration that wrenches associated to...
In this paper we give a robust logical and computational characterisation of peer-to-peer (p2p) database systems. We first define a precise model-theoretic semantics of a p2p sys...
Enrico Franconi, Gabriel M. Kuper, Andrei Lopatenk...
We present a very efficient multi-party computation protocol unconditionally secure against an active adversary. The security is maximal, i.e., active corruption of up to t < n/...
Background: Quantification of different types of cells is often needed for analysis of histological images. In our project, we compute the relative number of proliferating hepatoc...