Sciweavers

3031 search results - page 384 / 607
» Investigating human-computer optimization
Sort
View
107
Voted
DCC
2010
IEEE
15 years 3 months ago
Practical unconditionally secure two-channel message authentication
We investigate unconditional security for message authentication protocols that are designed using two-channel cryptography. We look at both noninteractive message authentication ...
Atefeh Mashatan, Douglas R. Stinson
DISOPT
2010
132views more  DISOPT 2010»
15 years 3 months ago
General approximation schemes for min-max (regret) versions of some (pseudo-)polynomial problems
While the complexity of min-max and min-max regret versions of most classical combinatorial optimization problems has been thoroughly investigated, there are very few studies abou...
Hassene Aissi, Cristina Bazgan, Daniel Vanderpoote...
112
Voted
DM
2010
96views more  DM 2010»
15 years 3 months ago
On well-rounded sublattices of the hexagonal lattice
Abstract. We produce an explicit parameterization of well-rounded sublattices of the hexagonal lattice in the plane, splitting them into similarity classes. We use this parameteriz...
Lenny Fukshansky, Daniel Moore, R. Andrew Ohana, W...
DM
2008
50views more  DM 2008»
15 years 3 months ago
Searching monotone multi-dimensional arrays
A d-dimensional array of real numbers is called monotone increasing if its entries are increasing along each dimension. Given An,d, a monotone increasing d-dimensional array with ...
Yongxi Cheng, Xiaoming Sun, Yiqun Lisa Yin
111
Voted
ESWA
2008
101views more  ESWA 2008»
15 years 3 months ago
Discovering during-temporal patterns (DTPs) in large temporal databases
Abstract Large temporal Databases (TDBs) usually contain a wealth of data about temporal events. Aimed at discovering temporal patterns with during relationship (during-temporal pa...
Li Zhang, Guoqing Chen, Tom Brijs, Xing Zhang