Sciweavers

325 search results - page 62 / 65
» Proofs of Restricted Shuffles
Sort
View
85
Voted
SIGUCCS
2000
ACM
15 years 1 months ago
Approaches to Computer Lab Management: Lockdown vs. Freedom
Basic approaches to computer lab management range along a spectrum from total lockdown of lab computers to total freedom. Total lockdown, which can be implemented with system perm...
Christopher Jones, Yasemin Tunc, Deborah Cherry
ECCV
2010
Springer
14 years 12 months ago
5D Motion Subspaces for Planar Motion
In practice, rigid objects often move on a plane. The object then rotates around a fixed axis and translates in a plane orthogonal to this axis. For a concrete example, think of a...
CRYPTO
2008
Springer
92views Cryptology» more  CRYPTO 2008»
14 years 11 months ago
Compression from Collisions, or Why CRHF Combiners Have a Long Output
A black-box combiner for collision resistant hash functions (CRHF) is a construction which given black-box access to two hash functions is collision resistant if at least one of th...
Krzysztof Pietrzak
JAC
2008
14 years 11 months ago
Rule 110: universality and catenations
Cellular automata are a simple model of parallel computation. Many people wonder about the computing power of such a model. Following an idea of S. Wolfram [16], M. Cook [3] has pr...
Gaétan Richard
SODA
2001
ACM
87views Algorithms» more  SODA 2001»
14 years 11 months ago
Steiner points in tree metrics don't (really) help
Consider an edge-weighted tree T = (V, E, w : E R+ ), in which a subset R of the nodes (called the required nodes) are colored red and the remaining nodes in S = V \R are colored ...
Anupam Gupta