Sciweavers

679 search results - page 118 / 136
» Using decision problems in public key cryptography
Sort
View
CIE
2007
Springer
15 years 6 months ago
Computational Complexity of Constraint Satisfaction
Abstract. The input to a constraint satisfaction problem (CSP) consists of a set of variables, each with a domain, and constraints between these variables formulated by relations o...
Heribert Vollmer
EAAI
2008
113views more  EAAI 2008»
14 years 11 months ago
Airlift mission monitoring and dynamic rescheduling
We describe the Flight Manager Assistant (FMA), a prototype system, designed to support real-time management of airlift operations at the USAF Air Mobility Command (AMC). In curre...
David E. Wilkins, Stephen F. Smith, Laurence A. Kr...
KRDB
1998
93views Database» more  KRDB 1998»
15 years 1 months ago
Intelligent Caching for Information Mediators: A KR Based Approach
We present a semantic caching approach for optimizing the performance of information mediators. A critical problem with information mediators, particularly those gathering and int...
Naveen Ashish, Craig A. Knoblock, Cyrus Shahabi
TIP
2010
107views more  TIP 2010»
14 years 6 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
98
Voted
BMCBI
2006
153views more  BMCBI 2006»
14 years 11 months ago
Discovery of time-delayed gene regulatory networks based on temporal gene expression profiling
Background: It is one of the ultimate goals for modern biological research to fully elucidate the intricate interplays and the regulations of the molecular determinants that prope...
Xia Li, Shaoqi Rao, Wei Jiang, Chuanxing Li, Yun X...