Sciweavers

18 search results - page 2 / 4
» Some inequalities related to the analysis of electricity auc...
Sort
View
CCS
2010
ACM
14 years 12 months ago
Accountability: definition and relationship to verifiability
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...
Ralf Küsters, Tomasz Truderung, Andreas Vogt
ICDT
2009
ACM
149views Database» more  ICDT 2009»
16 years 10 days ago
Query languages for data exchange: beyond unions of conjunctive queries
The class of unions of conjunctive queries (UCQ) has been shown to be particularly well-behaved for data exchange; its certain answers can be computed in polynomial time (in terms...
Juan Reutter, Marcelo Arenas, Pablo Barceló
LOCA
2007
Springer
15 years 5 months ago
SocialMotion: Measuring the Hidden Social Life of a Building
In this paper we present an approach to analyzing the social behaviors that occur in a typical office space. We describe a system consisting of over 200 motion sensors connected ...
Christopher Richard Wren, Yuri A. Ivanov, Ishwinde...
SMI
2005
IEEE
15 years 5 months ago
Designing with Distance Fields
Distance fields provide an implicit representation of shape that has advantages in many application areas; in this overview, we focus on their use in digital design. Distance fi...
Sarah F. Frisken, Ronald N. Perry
MP
2011
14 years 2 months ago
Strong KKT conditions and weak sharp solutions in convex-composite optimization
Using variational analysis techniques, we study convex-composite optimization problems. In connection with such a problem, we introduce several new notions as variances of the clas...
Xi Yin Zheng, Kung Fu Ng