Sciweavers

146 search results - page 14 / 30
» Computably Enumerable Sets and Quasi-Reducibility
Sort
View
ASIACRYPT
2008
Springer
14 years 21 days ago
MPC vs. SFE : Unconditional and Computational Security
Abstract. In secure computation among a set P of players one considers an adversary who can corrupt certain players. The three usually considered types of corruption are active, pa...
Martin Hirt, Ueli M. Maurer, Vassilis Zikas
JCB
2008
102views more  JCB 2008»
13 years 11 months ago
Canonical RNA Pseudoknot Structures
In this paper, we study k-noncrossing, -canonical RNA pseudoknot structures with minimum arc-length greater or equal to four. Let T OE4 k; .n/ denote the number of these structure...
Gang Ma, Christian M. Reidys
APAL
1998
71views more  APAL 1998»
13 years 10 months ago
Splitting Theorems and the Jump Operator
We investigate the relationship of (jumps of) the degrees of splittings of a computably enumerable set and the degree of the set. We prove that there is a high computably enumerab...
Rodney G. Downey, Richard A. Shore
CIE
2009
Springer
14 years 2 months ago
Spectra of Algebraic Fields and Subfields
An algebraic field extension of Q or Z/(p) may be regarded either as a structure in its own right, or as a subfield of its algebraic closure F (either Q or Z/(p)). We consider the ...
Andrey Frolov, Iskander Sh. Kalimullin, Russell Mi...
CIE
2005
Springer
14 years 4 months ago
Schnorr Dimension
Following Lutz’s approach to effective (constructive) dimension, we define a notion of dimension for individual sequences based on Schnorr’s concept(s) of randomness. In contr...
Rodney G. Downey, Wolfgang Merkle, Jan Reimann