Sciweavers

72 search results - page 4 / 15
» A tight lower bound for restricted pir protocols
Sort
View
INFOCOM
2012
IEEE
12 years 5 months ago
Expected loss bounds for authentication in constrained channels
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy conditions and communication costs. This is motivated by a numbe...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
ICPP
2009
IEEE
14 years 2 months ago
Performance Limits of Fair-Access in Underwater Sensor Networks
—This paper investigates fundamental performance limits of medium access control (MAC) protocols for particular underwater multi-hop sensor networks under a fair-access criterion...
Yang Xiao, Miao Peng, John H. Gibson, Geoffrey G. ...
SODA
2010
ACM
235views Algorithms» more  SODA 2010»
14 years 4 months ago
Algorithmic Lower Bounds for Problems Parameterized by Clique-width
Many NP-hard problems can be solved efficiently when the input is restricted to graphs of bounded tree-width or clique-width. In particular, by the celebrated result of Courcelle,...
Fedor V. Fomin, Petr A. Golovach, Daniel Lokshtano...
JACM
2006
146views more  JACM 2006»
13 years 7 months ago
Limits on the ability of quantum states to convey classical messages
We revisit the problem of conveying classical messages by transmitting quantum states, and derive new, optimal bounds on the number of quantum bits required for this task. Much of...
Ashwin Nayak, Julia Salzman
CORR
2006
Springer
164views Education» more  CORR 2006»
13 years 7 months ago
Approximation Algorithms for Restricted Cycle Covers Based on Cycle Decompositions
A cycle cover of a graph is a set of cycles such that every vertex is part of exactly one cycle. An L-cycle cover is a cycle cover in which the length of every cycle is in the set ...
Bodo Manthey