Sciweavers

849 search results - page 113 / 170
» Completely Non-malleable Schemes
Sort
View
SODA
1993
ACM
118views Algorithms» more  SODA 1993»
13 years 10 months ago
Scapegoat Trees
We present an algorithm for maintaining binary search trees. The amortized complexity per INSERT or DELETE is O(log n) while the worst-case cost of a SEARCH is O(log n). Scapegoat...
Igal Galperin, Ronald L. Rivest
CORR
2008
Springer
91views Education» more  CORR 2008»
13 years 9 months ago
A Distributed MAC Protocol for Cooperation in Random Access Networks
WLAN is one of the most successful applications of wireless communications in daily life because of low cost and ease of deployment. The enabling technique for this success is the ...
Georg Böcherer, Alexandre de Baynast
AUTOMATICA
2006
119views more  AUTOMATICA 2006»
13 years 9 months ago
Absolute stability of third-order systems: A numerical algorithm
The problem of absolute stability is one of the oldest open problems in the theory of control. Even for the particular case of second-order systems a complete solution was present...
Michael Margaliot, Christos Yfoulis
IAJIT
2008
134views more  IAJIT 2008»
13 years 9 months ago
A Dynamic Traffic Shaping Technique for a Scalable QoS in ATM Networks
: Traffic shaping function becomes imperative for the new broadband services that are being deployed in order to avoid information loss, to provide the end users multiple traffic o...
Francis Joseph Ogwu, Mohammad Talib, Ganiyu Aderou...
IJNSEC
2008
69views more  IJNSEC 2008»
13 years 9 months ago
Proof of Forward Security for Password-based Authenticated Key Exchange
Recently, M. Abdalla et al. proposed a slightly different variant of AuthA, based on the scheme proposed by E. Bresson et al., and provided the first complete proof of forward-sec...
Shuhua Wu, Yuefei Zhu