Sciweavers

71 search results - page 8 / 15
» Computationally Private Randomizing Polynomials and Their Ap...
Sort
View
CRYPTO
1999
Springer
109views Cryptology» more  CRYPTO 1999»
13 years 11 months ago
Coding Constructions for Blacklisting Problems without Computational Assumptions
Abstract. We consider the broadcast exclusion problem: how to transmit a message over a broadcast channel shared by N = 2n users so that all but some speciļ¬ed coalition of k excl...
Ravi Kumar, Sridhar Rajagopalan, Amit Sahai
ASIACRYPT
2004
Springer
14 years 24 days ago
Generic Homomorphic Undeniable Signatures
We introduce a new computational problem related to the interpolation of group homomorphisms which generalizes many famous cryptographic problems including discrete logarithm, Diļ¬...
Jean Monnerat, Serge Vaudenay
RECOMB
2010
Springer
14 years 2 months ago
Dense Subgraphs with Restrictions and Applications to Gene Annotation Graphs
Abstract. In this paper, we focus on ļ¬nding complex annotation patterns representing novel and interesting hypotheses from gene annotation data. We deļ¬ne a generalization of th...
Barna Saha, Allison Hoch, Samir Khuller, Louiqa Ra...
ICALP
2009
Springer
14 years 7 months ago
Limits and Applications of Group Algebras for Parameterized Problems
The algebraic framework introduced in [Koutis, Proc. of the 35th ICALP 2008] reduces several combinatorial problems in parameterized complexity to the problem of detecting multili...
Ioannis Koutis, Ryan Williams
BROADNETS
2004
IEEE
13 years 11 months ago
Handheld Routers: Intelligent Bandwidth Aggregation for Mobile Collaborative Communities
Multi-homed, mobile wireless computing and communication devices can spontaneously form communities to logically combine and share the bandwidth of each other's wide-area com...
Puneet Sharma, Sung-Ju Lee, Jack Brassil, Kang G. ...