Sciweavers

4325 search results - page 808 / 865
» Incremental computation with names
Sort
View
BIRTHDAY
2012
Springer
13 years 6 months ago
Deniable RSA Signature - The Raise and Fall of Ali Baba
The 40 thieves realize that the fortune in their cave is vanishing. A rumor says that Ali Baba has been granted access (in the form of a certificate) to the cave but they need evi...
Serge Vaudenay
CORR
2012
Springer
249views Education» more  CORR 2012»
13 years 6 months ago
Controlling Candidate-Sequential Elections
All previous work on “candidate-control” manipulation of elections has been in the model of full-information, simultaneous voting. This is a problem, since in quite a few real...
Edith Hemaspaandra, Lane A. Hemaspaandra, Jör...
94
Voted
CVPR
2000
IEEE
16 years 1 months ago
Chromatic Framework for Vision in Bad Weather
Conventional vision systems are designed to perform in clear weather. However, any outdoor vision system is incomplete without mechanisms that guarantee satisfactory performance u...
Srinivasa G. Narasimhan, Shree K. Nayar
PODC
2010
ACM
15 years 2 months ago
The multiplicative power of consensus numbers
: The Borowsky-Gafni (BG) simulation algorithm is a powerful reduction algorithm that shows that t-resilience of decision tasks can be fully characterized in terms of wait-freedom....
Damien Imbs, Michel Raynal
ICDE
2008
IEEE
142views Database» more  ICDE 2008»
16 years 12 days ago
An Inflationary Fixed Point Operator in XQuery
ct The backbone of the XML data model, namely ordered, unranked trees, is inherently recursive and it is natural to equip the associated languages with constructs that can query su...
Loredana Afanasiev, Torsten Grust, Maarten Marx, J...