Sciweavers

1554 search results - page 171 / 311
» cases 2003
Sort
View
149
Voted
ESA
2003
Springer
118views Algorithms» more  ESA 2003»
15 years 10 months ago
The Voronoi Diagram of Planar Convex Objects
This paper presents a dynamic algorithm for the construction of the Euclidean Voronoi diagram of a set of convex objects in the plane. We consider first the Voronoi diagram of smo...
Menelaos I. Karavelas, Mariette Yvinec
128
Voted
ESOP
2003
Springer
15 years 10 months ago
On the Secure Implementation of Security Protocols
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the cont...
Pablo Giambiagi, Mads Dam
164
Voted
EUROCRYPT
2003
Springer
15 years 10 months ago
Why Provable Security Matters?
Abstract. Recently, methods from provable security, that had been developped for the last twenty years within the research community, have been extensively used to support emerging...
Jacques Stern
GECCO
2003
Springer
15 years 10 months ago
Methods for Evolving Robust Programs
Many evolutionary computation search spaces require fitness assessment through the sampling of and generalization over a large set of possible cases as input. Such spaces seem par...
Liviu Panait, Sean Luke
ICALP
2003
Springer
15 years 10 months ago
Degree Distribution of the FKP Network Model
Recently, Fabrikant, Koutsoupias and Papadimitriou [7] introduced a natural and beautifully simple model of network growth involving a trade-off between geometric and network obje...
Noam Berger, Béla Bollobás, Christia...