Sciweavers

4698 search results - page 245 / 940
» Making Functionality More General
Sort
View
CORR
2010
Springer
86views Education» more  CORR 2010»
15 years 2 months ago
Secure Multiparty Computation with Partial Fairness
A protocol for computing a functionality is secure if an adversary in this protocol cannot cause more harm than in an ideal computation where parties give their inputs to a truste...
Amos Beimel, Eran Omri, Ilan Orlov
FDG
2009
ACM
15 years 10 months ago
System for Automated Interactive Lighting (SAIL)
Successful lighting in video games is more than a physically accurate illumination model. Aesthetics and function are of equal or greater importance. Lighting designers may deviat...
Joseph A. Zupko, Magy Seif El-Nasr
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 2 months ago
Scalable similarity search with optimized kernel hashing
Scalable similarity search is the core of many large scale learning or data mining applications. Recently, many research results demonstrate that one promising approach is creatin...
Junfeng He, Wei Liu, Shih-Fu Chang
WEA
2010
Springer
241views Algorithms» more  WEA 2010»
15 years 11 months ago
A Branch-and-Price Algorithm for Multi-mode Resource Leveling
Resource leveling is a variant of resource-constrained project scheduling in which a non-regular objective function, the resource availability cost, is to be minimized. We present ...
Eamonn T. Coughlan, Marco E. Lübbecke, Jens S...
TYPES
1999
Springer
15 years 8 months ago
Information Retrieval in a Coq Proof Library Using Type Isomorphisms
We propose a method to search for a lemma in a goq proof library by using the lemma type as a key. The method is based on the concept of type isomorphism developed within the funct...
David Delahaye