Sciweavers

99 search results - page 15 / 20
» Approximation Hardness and Secure Communication in Broadcast...
Sort
View
MOBISYS
2007
ACM
14 years 7 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
CORR
2010
Springer
182views Education» more  CORR 2010»
13 years 7 months ago
Index coding via linear programming
Abstract Anna Blasiak Robert Kleinberg Eyal Lubetzky Index Coding has received considerable attention recently motivated in part by applications such as fast video-on-demand and e...
Anna Blasiak, Robert D. Kleinberg, Eyal Lubetzky
CCS
2010
ACM
13 years 7 months ago
Sidebuster: automated detection and quantification of side-channel leaks in web application development
A web application is a "two-part" program, with its components deployed both in the browser and in the web server. The communication between these two components inevita...
Kehuan Zhang, Zhou Li, Rui Wang 0010, XiaoFeng Wan...
GLOBECOM
2009
IEEE
14 years 2 months ago
Local Estimation of Probabilities of Direct and Staggered Collisions in 802.11 WLANs
—Current 802.11 networks do not typically achieve the maximum potential throughput despite link adaptation and crosslayer optimization techniques designed to alleviate many cause...
Michael N. Krishnan, Sofie Pollin, Avideh Zakhor
STOC
2010
ACM
227views Algorithms» more  STOC 2010»
14 years 10 days ago
On the Round Complexity of Covert Computation
In STOC’05, von Ahn, Hopper and Langford introduced the notion of covert computation. In covert computation, a party runs a secure computation protocol over a covert (or stegano...
Vipul Goyal and Abhishek Jain