Sciweavers

3228 search results - page 531 / 646
» Computationally Sound Proofs
Sort
View
CORR
2008
Springer
143views Education» more  CORR 2008»
13 years 9 months ago
Convergence Thresholds of Newton's Method for Monotone Polynomial Equations
Abstract. Monotone systems of polynomial equations (MSPEs) are systems of fixedpoint equations X1 = f1(X1, . . . , Xn), . . . , Xn = fn(X1, . . . , Xn) where each fi is a polynomia...
Javier Esparza, Stefan Kiefer, Michael Luttenberge...
CORR
2006
Springer
146views Education» more  CORR 2006»
13 years 9 months ago
Oblivious-Transfer Amplification
Abstract. Oblivious transfer (OT) is a primitive of paramount importance in cryptography or, more precisely, two- and multi-party computation due to its universality. Unfortunately...
Jürg Wullschleger
IJNSEC
2006
110views more  IJNSEC 2006»
13 years 8 months ago
Password-based Encrypted Group Key Agreement
This paper presents an efficient password-based authenticated encrypted group key agreement protocol immune to dictionary attack under the computation Diffie-Hellman (CDH) assumpt...
Ratna Dutta, Rana Barua
SIGCSE
2008
ACM
140views Education» more  SIGCSE 2008»
13 years 8 months ago
Using iPodLinux in an introductory OS course
This paper describes a proof of concept for introducing iPods and iPodLinux into a one-semester introductory undergraduate operating systems course. iPodLinux is a version of the ...
Barry Lawson, Lewis Barnett
IJCSA
2007
143views more  IJCSA 2007»
13 years 8 months ago
Incremental Trade-Off Management for Preference-Based Queries
Preference-based queries often referred to as skyline queries play an important role in cooperative query processing. However, their prohibitive result sizes pose a severe challen...
Wolf-Tilo Balke, Ulrich Güntzer, Christoph Lo...