Sciweavers

27692 search results - page 72 / 5539
» Where is ...
Sort
View
102
Voted
ENTCS
2002
95views more  ENTCS 2002»
15 years 28 days ago
A Proof Dedicated Meta-Language
We describe a proof dedicated meta-language, called Ltac, in the context of the Coq proof assistant. This new layer of meta-language is quite appropriate to write small and local ...
David Delahaye
109
Voted
IJCGA
2010
99views more  IJCGA 2010»
14 years 11 months ago
Finding All Door Locations that Make a Room Searchable
—A room is a simple polygon with a prespecified point, called the door, on its boundary. Search may be conducted by two guards on the boundary who keep mutual visibility at all ...
Tsunehiko Kameda, John Z. Zhang
116
Voted
SIAMCOMP
2008
154views more  SIAMCOMP 2008»
14 years 11 months ago
Cryptography in the Bounded-Quantum-Storage Model
We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivio...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
83
Voted
SIGMETRICS
2010
ACM
122views Hardware» more  SIGMETRICS 2010»
14 years 11 months ago
Heavy-traffic limits for nearly deterministic queues
We establish heavy-traffic limits for nearly deterministic queues, such as the G/D/n many-server queue. Since waiting times before starting service in the G/D/n queue are equivale...
Karl Sigman, Ward Whitt
101
Voted
TWC
2010
14 years 7 months ago
MIMO Broadcast Channels with Spatial Heterogeneity
We develop a realistic model for multiple-input multiple-output (MIMO) broadcast channels, where each randomly located user's average SNR depends on its distance from the tran...
Illsoo Sohn, Jeffrey G. Andrews, Kwang Bok Lee