Sciweavers

340 search results - page 36 / 68
» ets 2009
Sort
View
VIS
2009
IEEE
300views Visualization» more  VIS 2009»
16 years 1 months ago
Predictor-Corrector Schemes for Visualization of Smoothed Particle Hydrodynamics Data
Abstract--In this paper we present a method for vortex core line extraction which operates directly on the smoothed particle hydrodynamics (SPH) representation and, by this, genera...
Benjamin Schindler, Raphael Fuchs, John Biddisco...
STOC
2009
ACM
159views Algorithms» more  STOC 2009»
16 years 12 days ago
Message passing algorithms and improved LP decoding
Linear programming decoding for low-density parity check codes (and related domains such as compressed sensing) has received increased attention over recent years because of its p...
Sanjeev Arora, Constantinos Daskalakis, David Steu...
TCC
2009
Springer
130views Cryptology» more  TCC 2009»
16 years 10 days ago
How Efficient Can Memory Checking Be?
We consider the problem of memory checking, where a user wants to maintain a large database on a remote server but has only limited local storage. The user wants to use the small ...
Cynthia Dwork, Moni Naor, Guy N. Rothblum, Vinod V...
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
16 years 10 days ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
16 years 10 days ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin