Sciweavers

2924 search results - page 102 / 585
» Lower Bounds in Distributed Computing
Sort
View
78
Voted
VMV
2008
151views Visualization» more  VMV 2008»
15 years 2 months ago
Adaptive surface decomposition for the distance computation of arbitrarily shaped objects
We propose an adaptive decomposition algorithm to compute separation distances between arbitrarily shaped objects. Using the Gilbert-JohnsonKeerthi algorithm (GJK), we search for ...
Marc Gissler, Matthias Teschner
110
Voted
FSTTCS
2010
Springer
14 years 10 months ago
On extracting computations from propositional proofs (a survey)
This paper describes a project that aims at showing that propositional proofs of certain tautologies in weak proof system give upper bounds on the computational complexity of func...
Pavel Pudlák
PODC
1999
ACM
15 years 5 months ago
Memory Space Requirements for Self-Stabilizing Leader Election Protocols
We study the memory requirements of self-stabilizing leader election (SSLE) protocols. We are mainly interested in two types of systems: anonymous systems and id-based systems. We...
Joffroy Beauquier, Maria Gradinariu, Colette Johne...
99
Voted
GC
2007
Springer
15 years 17 days ago
On Small and Large Hyperplanes of DW (5, q )
We determine lower and upper bounds for the size of a hyperplane of the dual polar space DW(5, q). In some cases, we also determine all hyperplanes attaining these bounds.
Bart De Bruyn, Harm Pralle
91
Voted
CRYPTO
2006
Springer
111views Cryptology» more  CRYPTO 2006»
15 years 4 months ago
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
We address the message authentication problem in two seemingly different communication models. In the first model, the sender and receiver are connected by an insecure channel and...
Moni Naor, Gil Segev, Adam Smith