Sciweavers

2863 search results - page 485 / 573
» Constructing minimum-interference networks
Sort
View
CRYPTO
2005
Springer
125views Cryptology» more  CRYPTO 2005»
15 years 7 months ago
Secure Computation Without Authentication
In the setting of secure multiparty computation, a set of parties wish to jointly compute some function of their inputs. Such a computation must preserve certain security propertie...
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pa...
PPDP
2005
Springer
15 years 7 months ago
ReactiveML: a reactive extension to ML
We present ReactiveML, a programming language dedicated to the implementation of complex reactive systems as found in graphical user interfaces, video games or simulation problems...
Louis Mandel, Marc Pouzet
JCDL
2003
ACM
87views Education» more  JCDL 2003»
15 years 6 months ago
The Web-DL Environment for Building Digital Libraries from the Web
The Web contains a huge volume of unstructured data, which is difficult to manage. In digital libraries, on the other hand, information is explicitly organized, described, and ma...
Pável Calado, Marcos André Gon&ccedi...
ESA
1993
Springer
109views Algorithms» more  ESA 1993»
15 years 5 months ago
Optimal Upward Planarity Testing of Single-Source Digraphs
A digraph is upward planar if it has a planar drawing such that all the edges are monotone with respect to the vertical direction. Testing upward planarity and constructing upward ...
Paola Bertolazzi, Giuseppe Di Battista, Carlo Mann...
ASIAN
2004
Springer
153views Algorithms» more  ASIAN 2004»
15 years 5 months ago
Chi-Square Matrix: An Approach for Building-Block Identification
This paper presents a line of research in genetic algorithms (GAs), called building-block identification. The building blocks (BBs) are common structures inferred from a set of sol...
Chatchawit Aporntewan, Prabhas Chongstitvatana