Sciweavers

3228 search results - page 438 / 646
» Computationally Sound Proofs
Sort
View
132
Voted
STOC
2003
ACM
109views Algorithms» more  STOC 2003»
16 years 3 months ago
Generating random regular graphs
Random regular graphs play a central role in combinatorics and theoretical computer science. In this paper, we analyze a simple algorithm introduced by Steger and Wormald [10] and...
Jeong Han Kim, Van H. Vu
119
Voted
STOC
2002
ACM
107views Algorithms» more  STOC 2002»
16 years 3 months ago
Quantum lower bound for the collision problem
The collision problem is to decide whether a function X : {1, . . . , n} {1, . . . , n} is one-to-one or two-to-one, given that one of these is the case. We show a lower bound of...
Scott Aaronson
ICALP
2009
Springer
16 years 3 months ago
On Cartesian Trees and Range Minimum Queries
We present new results on Cartesian trees with applications in range minimum queries and bottleneck edge queries. We introduce a cache-oblivious Cartesian tree for solving the ran...
Erik D. Demaine, Gad M. Landau, Oren Weimann
ICSE
2007
IEEE-ACM
16 years 3 months ago
GoalDebug: A Spreadsheet Debugger for End Users
We present a spreadsheet debugger targeted at end users. Whenever the computed output of a cell is incorrect, the user can supply an expected value for a cell, which is employed b...
Robin Abraham, Martin Erwig
188
Voted

Publication
545views
16 years 16 days ago
Reid et al.'s Distance Bounding Protocol and Mafia Fraud Attacks over Noisy Channels
Distance bounding protocols are an effective countermeasure against relay attacks including distance fraud, mafia fraud and terrorist fraud attacks. Reid et al. proposed the first ...
A. Mitrokotsa, C. Dimitrakakis, P. Peris-Lopez, J....