Sciweavers

5344 search results - page 225 / 1069
» Privacy-Preserving Set Operations
Sort
View
142
Voted
CAINE
2003
15 years 5 months ago
A Unified Architecture for the Implementation of Security Protocols
Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a u...
Ibrahim S. Abdullah, Daniel A. Menascé
121
Voted
ACL
1994
15 years 5 months ago
Compact Representations by Finite-State Transducers
Finite-state transducers give efficient representations of many Natural Language phenomena. They allow to account for complex lexicon restrictions encountered, without involving t...
Mehryar Mohri
113
Voted
COR
2008
112views more  COR 2008»
15 years 3 months ago
Bi-dynamic constraint aggregation and subproblem reduction
Dynamic constraint aggregation was recently introduced by Elhallaoui et al. [Dynamic aggregation of set partitioning constraints in column generation. Operations Research 2005; 53...
Issmail Elhallaoui, Guy Desaulniers, Abdelmoutalib...
96
Voted
COMBINATORICS
2006
92views more  COMBINATORICS 2006»
15 years 3 months ago
Equitable Matroids
One way to choose a basis of a matroid at random is to choose an ordering of the ground set uniformly at random and then use the greedy algorithm to find a basis. We investigate t...
Dillon Mayhew
133
Voted
EOR
2006
104views more  EOR 2006»
15 years 3 months ago
An linear programming based lower bound for the simple assembly line balancing problem
The simple assembly line balancing problem is a classical integer programming problem in operations research. A set of tasks, each one being an indivisible amount of work requirin...
Marc Peeters, Zeger Degraeve