Sciweavers

2430 search results - page 248 / 486
» Computing Tutte Polynomials
Sort
View
LICS
1997
IEEE
15 years 8 months ago
Ground Reducibility is EXPTIME-Complete
Abstract. We prove that ground reducibility is EXPTIME-complete in the general case. EXPTIME-hardness is proved by encoding the emptiness problem for the intersection of recognizab...
Hubert Comon, Florent Jacquemard
COCO
1989
Springer
97views Algorithms» more  COCO 1989»
15 years 8 months ago
On the Structure of Bounded Queries to Arbitrary NP Sets
Kadin [6] showed that if the Polynomial Hierarchy (PH) has infinitely many levels, then for all k, PSAT[k] ⊂ PSAT[k+1]. This paper extends Kadin’s technique and shows that a p...
Richard Chang
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 7 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
DEXA
2008
Springer
87views Database» more  DEXA 2008»
15 years 5 months ago
Tracking Moving Objects in Anonymized Trajectories
Multiple target tracking (MTT) is a well-studied technique in the field of radar technology, which associates anonymized measurements with the appropriate object trajectories. This...
Nikolay Vyahhi, Spiridon Bakiras, Panos Kalnis, Ga...
APVIS
2008
15 years 5 months ago
Second Order Pre-Integrated Volume Rendering
In the field of Volume Rendering, pre-integration techniques for arbitrary transfer functions has certainly led to the most significant and convincing results both quality and per...
Jean-François El Hajjar, Stephane Marchesin...