Sciweavers

14190 search results - page 2820 / 2838
» computer 2008
Sort
View
ESA
2008
Springer
96views Algorithms» more  ESA 2008»
15 years 1 months ago
Stabbing Convex Polygons with a Segment or a Polygon
Let O = {O1, . . . , Om} be a set of m convex polygons in R2 with a total of n vertices, and let B be another convex k-gon. A placement of B, any congruent copy of B (without refle...
Pankaj K. Agarwal, Danny Z. Chen, Shashidhara K. G...
ESA
2008
Springer
148views Algorithms» more  ESA 2008»
15 years 1 months ago
Selfish Bin Packing
Following recent interest in the study of computer science problems in a game theoretic setting, we consider the well known bin packing problem where the items are controlled by se...
Leah Epstein, Elena Kleiman
ESORICS
2008
Springer
15 years 1 months ago
Remote Integrity Check with Dishonest Storage Server
We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server,...
Ee-Chien Chang, Jia Xu
ESORICS
2008
Springer
15 years 1 months ago
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud
Abstract. Identity fraud (IDF) may be defined as unauthorized exploitation of credential information through the use of false identity. We propose CROO, a universal (i.e. generic) ...
D. Nali, Paul C. van Oorschot
ESWS
2008
Springer
15 years 1 months ago
Rabbit: Developing a Control Natural Language for Authoring Ontologies
: The mathematical nature of description logics has meant that domain experts find them hard to understand. This forms a significant impediment to the creation and adoption of onto...
Glen Hart, Martina Johnson, Catherine Dolbear
« Prev « First page 2820 / 2838 Last » Next »