Sciweavers

7839 search results - page 1316 / 1568
» What's there and what's not
Sort
View
CIARP
2009
Springer
15 years 8 months ago
3D and Appearance Modeling from Images
This paper gives an overview of works done in our group on 3D and appearance modeling of objects, from images. The backbone of our approach is to use what we consider as the princi...
Peter F. Sturm, Amaël Delaunoy, Pau Gargallo,...
CIKM
2009
Springer
15 years 8 months ago
Mining linguistic cues for query expansion: applications to drug interaction search
Given a drug under development, what are other drugs or biochemical compounds that it might interact with? Early answers to this question, by mining the literature, are valuable f...
Sheng Guo, Naren Ramakrishnan
COCOON
2009
Springer
15 years 8 months ago
On Smoothed Analysis of Quicksort and Hoare's Find
We provide a smoothed analysis of Hoare’s find algorithm and we revisit the smoothed analysis of quicksort. Hoare’s find algorithm – often called quickselect – is an easy...
Mahmoud Fouz, Manfred Kufleitner, Bodo Manthey, Ni...
COCOON
2009
Springer
15 years 8 months ago
On the Performances of Nash Equilibria in Isolation Games
: Network games play a fundamental role in understanding behavior in many domains, ranging from communication networks through markets to social networks. Such networks are used, a...
Vittorio Bilò, Michele Flammini, Gianpiero ...
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
15 years 8 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
« Prev « First page 1316 / 1568 Last » Next »