Sciweavers

1086 search results - page 196 / 218
» Points surrounding the origin
Sort
View
85
Voted
OR
2005
Springer
15 years 5 months ago
Optimal Fares for Public Transport
The fare planning problem for public transport is to design a system of fares that maximize the revenue. We introduce a nonlinear optimization model to approach this problem. It i...
Ralf Borndörfer, Marika Neumann, Marc E. Pfet...
TCC
2005
Springer
113views Cryptology» more  TCC 2005»
15 years 5 months ago
Entropic Security and the Encryption of High Entropy Messages
Russell and Wang [22] recently introduced an elegant, information-theoretic notion called entropic security of encryption: they required that the cipher text leak no predicate of ...
Yevgeniy Dodis, Adam Smith
ACMACE
2004
ACM
15 years 5 months ago
Audio games: new perspectives on game audio
This paper discusses the design of audio games, a quite new computer game category that originates from games for players with visual impairments, as well as mainstream music game...
Johnny Friberg, Dan Gärdenfors
NSPW
2004
ACM
15 years 5 months ago
Support for multi-level security policies in DRM architectures
Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
ASIACRYPT
2004
Springer
15 years 5 months ago
Improved Setup Assumptions for 3-Round Resettable Zero Knowledge
In the bare public-key model, introduced by Canetti et al. [STOC 2000], it is only assumed that each verifier deposits during a setup phase a public key in a file accessible by a...
Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Vis...