Sciweavers

3731 search results - page 656 / 747
» cases 2006
Sort
View
JOC
2000
181views more  JOC 2000»
15 years 12 days ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
104
Voted
MST
2000
86views more  MST 2000»
15 years 11 days ago
Team Learning of Computable Languages
A team of learning machines is a multiset of learning machines. A team is said to successfully learn a concept just in case each member of some nonempty subset, of predetermined s...
Sanjay Jain, Arun Sharma
COMBINATORICS
1998
99views more  COMBINATORICS 1998»
15 years 9 days ago
Constructions for Cubic Graphs with Large Girth
The aim of this paper is to give a coherent account of the problem of constructing cubic graphs with large girth. There is a well-defined integer µ0(g), the smallest number of v...
Norman Biggs
120
Voted
COMBINATORICS
1998
100views more  COMBINATORICS 1998»
15 years 9 days ago
Lattice Paths Between Diagonal Boundaries
A bivariate symmetric backwards recursion is of the form d[m, n] = w0(d[m− 1, n]+d[m, n−1])+ω1(d[m−r1, n−s1]+d[m−s1, n−r1])+· · ·+ωk(d[m−rk, n−sk] +d[m−sk, ...
Heinrich Niederhausen
IJCV
2002
99views more  IJCV 2002»
15 years 9 days ago
Subjective Surfaces: A Geometric Model for Boundary Completion
We present a geometric model and a computational method for segmentation of images with missing boundaries. In many situations, the human visual system fills in missing gaps in ed...
Alessandro Sarti, Ravi Malladi, James A. Sethian