Sciweavers

464 search results - page 89 / 93
» Enjoy the Paper: Lexicology
Sort
View
143
Voted
FUN
2010
Springer
230views Algorithms» more  FUN 2010»
15 years 3 months ago
Scheduling with Bully Selfish Jobs
In job scheduling with precedence constraints, i j means that job j cannot start being processed before job i is completed. In this paper we consider selfish bully jobs who do no...
Tami Tamir
AIIDE
2007
15 years 2 months ago
Personality-based Adaptation for Teamwork in Game Agents
This paper presents a novel learning framework to provide computer game agents the ability to adapt to the player as well as other game agents. Our technique generally involves a ...
Chek Tien Tan, Ho-Lun Cheng
110
Voted
ASIACRYPT
2008
Springer
15 years 2 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
108
Voted
CP
2008
Springer
15 years 1 months ago
Model Restarts for Structural Symmetry Breaking
ctural abstractions that were introduced in [17]. Compared with other symmetry-breaking techniques, the big advantage of dynamic symmetry breaking is that it can accommodate dynami...
Daniel S. Heller, Aurojit Panda, Meinolf Sellmann,...
EUROCRYPT
2008
Springer
15 years 1 months ago
The Twin Diffie-Hellman Problem and Applications
ded abstract of this paper appears in Advances in Cryptology -- EUROCRYPT '08, Lecture Notes in Computer Science Vol. 4965, N. Smart ed., Springer-Verlag, 2008. This is the fu...
David Cash, Eike Kiltz, Victor Shoup