Sciweavers

2725 search results - page 390 / 545
» Constraint Solving for Interpolation
Sort
View
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 1 months ago
How to prevent type-flaw attacks on security protocols under algebraic properties
In this paper, we prove that type-tagging prevents type-flaw attacks on security protocols that use the Exclusive-OR operator as our main contribution. Our proof method is general ...
Sreekanth Malladi, Pascal Lafourcade
DISOPT
2008
113views more  DISOPT 2008»
15 years 1 months ago
The inverse 1-median problem on a cycle
Abstract. Let the graph G = (V, E) be a cycle with n + 1 vertices, nonnegative vertex weights and positive edge lengths. The inverse 1-median problem on a cycle consists in changin...
Rainer E. Burkard, Carmen Pleschiutschnig, Jianzho...
115
Voted
EOR
2010
113views more  EOR 2010»
15 years 1 months ago
Optimal solutions for unrelated parallel machines scheduling problems using convex quadratic reformulations
We consider the unrelated parallel machines scheduling problem where jobs have earliness and tardiness penalties and a common due date. We formulate this problem and some of its v...
Marie-Christine Plateau, Yasmin A. Rios-Solis
115
Voted
CVIU
2006
129views more  CVIU 2006»
15 years 1 months ago
Integrating multiple levels of zoom to enable activity analysis
In this paper, we present a multi-zoom framework for activity analysis in situations requiring combinations of both detailed and coarse views of the scene. The epipolar geometry i...
Paul Smith, Mubarak Shah, Niels da Vitoria Lobo
EOR
2006
70views more  EOR 2006»
15 years 1 months ago
Search allocation game
This paper deals with a multi-stage two-person zero-sum game called the multi-stage search allocation game (MSSAG), in which a searcher and an evader participate. The searcher dist...
Ryusuke Hohzaki