Sciweavers

1120 search results - page 25 / 224
» Making computer science minority-friendly
Sort
View
FOCS
2003
IEEE
15 years 5 months ago
Bounded-Concurrent Secure Two-Party Computation in a Constant Number of Rounds
We consider the problem of constructing a general protocol for secure two-party computation in a way that preserves security under concurrent composition. In our treatment, we foc...
Rafael Pass, Alon Rosen
CAD
2011
Springer
14 years 6 months ago
Computing the minimum enclosing sphere of free-form hypersurfaces in arbitrary dimensions
The problem of computing the minimum enclosing sphere (MES) of a point set is a classical problem in Computational Geometry. As an LP-type problem, its expected running time on th...
Ramanathan Muthuganapathy, Gershon Elber, Gill Bar...
GI
2010
Springer
14 years 9 months ago
Cloud Computing for Autonomous Control in Logistics
Abstract: Logistics processes in a globalised economy are increasingly complex, dynamic, and distributed. These properties pose major challenges for logistics planning and control....
Arne Schuldt, Karl Hribernik, Jan D. Gehrke, Klaus...
FOCS
2008
IEEE
15 years 6 months ago
Computing the Tutte Polynomial in Vertex-Exponential Time
The deletion–contraction algorithm is perhaps the most popular method for computing a host of fundamental graph invariants such as the chromatic, flow, and reliability polynomi...
Andreas Björklund, Thore Husfeldt, Petteri Ka...
IMSCCS
2007
IEEE
15 years 6 months ago
TOPSAW Sawing Optimization Analysis Using Grid Computing
TOPSAW program was developed by Dr. S. Chang and his team and has been successfully used in the replication of sawmill cutting to determine the optimal cutting pattern for a log t...
Ashwin Bommathanahalli, Maoyuan Xie, Zhifeng Yun, ...