Sciweavers

15073 search results - page 2738 / 3015
» Probabilistic algorithms for computing resultants
Sort
View
ICTAC
2005
Springer
15 years 9 months ago
Revisiting Failure Detection and Consensus in Omission Failure Environments
It has recently been shown that fair exchange, a security problem in distributed systems, can be reduced to a fault tolerance problem, namely a special form of distributed consensu...
Carole Delporte-Gallet, Hugues Fauconnier, Felix C...
IMA
2005
Springer
71views Cryptology» more  IMA 2005»
15 years 9 months ago
Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
Abstract. The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi et al. and Vazirani and Vazirani, who proved independently that O(log...
Andrey Sidorenko, Berry Schoenmakers
ISVC
2005
Springer
15 years 9 months ago
Structural and Textural Skeletons for Noisy Shapes
The extraction of consistent skeletons in the presence of boundary noise is still a problem for most skeletonization algorithms. Many suppress skeletons associated with boundary pe...
Wooi-Boon Goh, Kai-Yun Chan
NOSSDAV
2005
Springer
15 years 9 months ago
A formal approach to design optimized multimedia service overlay
Service overlay networks have recently attracted tremendous interests. In this paper, we propose a new integrated framework for specifying services composed of service components ...
Hirozumi Yamaguchi, Khaled El-Fakih, Akihito Hirom...
PKDD
2005
Springer
94views Data Mining» more  PKDD 2005»
15 years 9 months ago
Visual Terrain Analysis of High-Dimensional Datasets
Abstract. Most real-world datasets are, to a certain degree, skewed. When considered that they are also large, they become the pinnacle challenge in data analysis. More importantly...
Wenyuan Li, Kok-Leong Ong, Wee Keong Ng
« Prev « First page 2738 / 3015 Last » Next »