Sciweavers

13376 search results - page 2266 / 2676
» Problem Solving with
Sort
View
DCG
2008
93views more  DCG 2008»
15 years 5 months ago
Metric Combinatorics of Convex Polyhedra: Cut Loci and Nonoverlapping Unfoldings
Let S be the boundary of a convex polytope of dimension d + 1, or more generally let S be a convex polyhedral pseudomanifold. We prove that S has a polyhedral nonoverlapping unfold...
Ezra Miller, Igor Pak
ACTA
2006
104views more  ACTA 2006»
15 years 5 months ago
Safe projections of binary data sets
Abstract Selectivity estimation of a boolean query based on frequent itemsets can be solved by describing the problem by a linear program. However, the number of variables in the e...
Nikolaj Tatti
EAAI
2008
75views more  EAAI 2008»
15 years 5 months ago
Enacting agent-based services for automated procurement
Negotiation events in industrial procurement involving multiple, highly customisable goods pose serious challenges to buying agents when trying to determine the best set of provid...
Andrea Giovannucci, Juan A. Rodríguez-Aguil...
148
Voted
CORR
2006
Springer
140views Education» more  CORR 2006»
15 years 5 months ago
A Vortex Method for Bi-phasic Fluids Interacting with Rigid Bodies
We present an accurate Lagrangian method based on vortex particles, level-sets, and immersed boundary methods, for animating the interplay between two fluids and rigid solids. We ...
Mathieu Coquerelle, Jérémie Allard, ...
IJACT
2008
83views more  IJACT 2008»
15 years 5 months ago
On the relation among various security models for certificateless cryptography
: Certificateless cryptography is a promising technology for solving the key escrow problem in identity-based cryptography. However, the lack of a unified set of definitions and se...
Qiong Huang, Duncan S. Wong
« Prev « First page 2266 / 2676 Last » Next »