Sciweavers

494 search results - page 14 / 99
» Heap Building Bounds
Sort
View
CRYPTO
2001
Springer
106views Cryptology» more  CRYPTO 2001»
15 years 3 months ago
Oblivious Transfer in the Bounded Storage Model
Building on a previous important work of Cachin, Cr´epeau, and Marcil [15], we present a provably secure and more efficient protocol for 2 1 -Oblivious Transfer with a storage-bou...
Yan Zong Ding
GECCO
2008
Springer
155views Optimization» more  GECCO 2008»
14 years 11 months ago
Towards memoryless model building
Probabilistic model building methods can render difficult problems feasible by identifying and exploiting dependencies. They build a probabilistic model from the statistical prope...
David Iclanzan, Dumitru Dumitrescu
62
Voted
ATAL
1997
Springer
15 years 2 months ago
TKQML: A Scripting Tool for Building Agents
Tcl/Tk is an attractive language for the design of intelligent agents because it allows the quick construction of prototypes and user interfaces; new scripts can easily be bound at...
R. Scott Cost, Ian Soboroff, Jeegar Lakhani, Timot...
86
Voted
TVCG
2012
202views Hardware» more  TVCG 2012»
13 years 28 days ago
Automatic Extraction of Manhattan-World Building Masses from 3D Laser Range Scans
—We propose a novel approach for the reconstruction of urban structures from 3D point clouds with an assumption of Manhattan World (MW) building geometry; i.e., the predominance ...
Carlos A. Vanegas, Daniel G. Aliaga, Bedrich Benes
INFOCOM
2009
IEEE
15 years 5 months ago
Building Covert Channels over the Packet Reordering Phenomenon
Abstract—New modes of communication have shown themselves to be needed for more secure and private types of data. Steganography or data-hiding through covert channels can be high...
Adel El-Atawy, Ehab Al-Shaer