Sciweavers

2430 search results - page 179 / 486
» Computing Tutte Polynomials
Sort
View
SIGECOM
2011
ACM
203views ECommerce» more  SIGECOM 2011»
14 years 7 months ago
Polynomial-time computation of exact correlated equilibrium in compact games
In a landmark paper, Papadimitriou and Roughgarden [2008] described a polynomial-time algorithm (“Ellipsoid Against Hope”) for computing sample correlated equilibria of concis...
Albert Xin Jiang, Kevin Leyton-Brown
164
Voted
IPMI
2003
Springer
16 years 5 months ago
Meshfree Representation and Computation: Applications to Cardiac Motion Analysis
Abstract. For medical image analysis issues where the domain mappings between images involve large geometrical shape changes, such as the cases of nonrigid motion recovery and inte...
Huafeng Liu, Pengcheng Shi
INFOCOM
2008
IEEE
15 years 11 months ago
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing
—Trusted Collaborative Computing (TCC) is a new research and application paradigm. Two important challenges in such a context are represented by secure information transmission a...
Xukai Zou, Yuan-Shun Dai, Elisa Bertino
CRYPTO
2005
Springer
171views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes
Error correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, we study the connections between codes, matroids, and a s...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
175
Voted
STOC
2000
ACM
137views Algorithms» more  STOC 2000»
15 years 8 months ago
On the complexity of verifiable secret sharing and multiparty computation
We first study the problem of doing Verifiable Secret Sharing (VSS) information theoretically secure for a general access structure. We do it in the model where private channels b...
Ronald Cramer, Ivan Damgård, Stefan Dziembow...