Sciweavers

5114 search results - page 999 / 1023
» Learning for Evolutionary Design
Sort
View
89
Voted
EUROCRYPT
2010
Springer
15 years 2 months ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
85
Voted
CCO
2001
Springer
161views Combinatorics» more  CCO 2001»
15 years 2 months ago
Branch, Cut, and Price: Sequential and Parallel
Branch, cut, and price (BCP) is an LP-based branch and bound technique for solving large-scale discrete optimization problems (DOPs). In BCP, both cuts and variables can be generat...
Laszlo Ladányi, Ted K. Ralphs, Leslie E. Tr...
82
Voted
SEMWEB
2001
Springer
15 years 2 months ago
OntoMap - the Guide to the Upper-Level
Abstract. The upper-level ontologies are theories that capture the most common concepts, which are relevant for many of the tasks involving knowledge extraction, representation, an...
Atanas K. Kirakov, Marin Dimitrov
86
Voted
SIGGRAPH
2000
ACM
15 years 2 months ago
The digital Michelangelo project: 3D scanning of large statues
We describe a hardware and software system for digitizing the shape and color of large fragile objects under non-laboratory conditions. Our system employs laser triangulation rang...
Marc Levoy, Kari Pulli, Brian Curless, Szymon Rusi...
ICMCS
1999
IEEE
126views Multimedia» more  ICMCS 1999»
15 years 2 months ago
Error Spreading: Reducing Bursty Errors in Continuous Media Streaming
With the growing popularity of the Internet, there is increasing interest in using it for audio and video transmission. Periodic network overloads, leading to bursty packet losses...
Hung Q. Ngo, Srivatsan Varadarajan, Jaideep Srivas...