Search

Showing total 6,266 results

Search Constraints

Start Over You searched for: Topic algorithm analysis and problem complexity Remove constraint Topic: algorithm analysis and problem complexity Database Supplemental Index Remove constraint Database: Supplemental Index
6,266 results

Search Results

201. mcmas: A Model Checker for Multi-agent Systems.

202. Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness.

203. Efficient Blind and Partially Blind Signatures Without Random Oracles.

204. Counting Models in Integer Domains.

205. A Dichotomy Theorem for Typed Constraint Satisfaction Problems.

206. A Progressive Simplifier for Satisfiability Modulo Theories.

207. From Propositional Satisfiability to Satisfiability Modulo Theories.

208. Towards Practical Computable Functions on Context-Free Languages.

209. Secure Computations in a Minimal Model Using Multiple-Valued ESOP Expressions.

210. Cluster Computing and the Power of Edge Recognition.

211. On Load-Balanced Semi-matchings for Weighted Bipartite Graphs.

212. Mitosis in Computational Complexity.

213. Parceling the Butterfly and the Batcher Sorting Network.

214. Fair Bandwidth Allocation Without Per-Flow State.

215. 3-D Minimum Energy Broadcasting.

216. Strongly Terminating Early-Stopping k-Set Agreement in Synchronous Systems with General Omission Failures.

217. Local Algorithms for Autonomous Robot Systems.

218. Energy-Efficient Algorithms for Flow Time Minimization.

219. Optimal Node Routing.

220. Convergence of Autonomous Mobile Robots with Inaccurate Sensors and Movements.

221. Minimality of the Hamming Weight of the τ-NAF for Koblitz Curves and Improved Combination with Point Halving.

222. Views and Iterators for Generic Constraint Implementations.

223. Enhanced Forward-Secure User Authentication Scheme with Smart Cards.

224. Towards Secure Electronic Workflows.

225. An Infrastructure Supporting Secure Internet Routing.

226. On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders.

227. A User-Friendly Approach to Human Authentication of Messages.

228. Secure Biometric Authentication for Weak Computational Devices.

229. Approximate Message Authentication and Biometric Entity Authentication.

230. Securing Sensitive Data with the Ingrian DataSecure Platform.

231. Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures).

232. How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors.

233. SMASH - A Cryptographic Hash Function.

234. Narrow T-Functions.

236. Developing Novel Statistical Bandwidths for Communication Networks with Incomplete Information.

237. Compact Error-Resilient Computational DNA Tiling Assemblies.

238. Testing Structure Freeness of Regular Sets of Biomolecular Sequences.

239. Concise Version Vectors in WinFS.

240. Computing with Reads and Writes in the Absence of Step Contention.

241. Collaborative Sensing Using Sensors of Uncoordinated Mobility.

242. Sensor Localization in an Obstructed Environment.

243. SEBAG: A New Dynamic End-to-End Connection Management Scheme for Multihomed Mobile Hosts.

244. A Model for the Distribution Design of Distributed Databases and an Approach to Solve Large Instances.

245. An Efficient Social Network-Mobility Model for MANETs.

246. In-Band Crosstalk Performance of WDM Optical Networks Under Different Routing and Wavelength Assignment Algorithms.

247. Safe Composition of Distributed Programs Communicating over Order-Preserving Imperfect Channels.

248. Labeling Schemes for Tree Representation.

249. Communication Data Multiplexing in Distributed Simulation.

250. Performance Monitoring for Distributed Service Oriented Grid Architecture.