Sciweavers

253 search results - page 47 / 51
» Conditional Symmetry Breaking
Sort
View
ACNS
2006
Springer
117views Cryptology» more  ACNS 2006»
14 years 1 months ago
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
We study the influence of collision-finding attacks on the security of time-stamping schemes. We distinguish between client-side hash functions used to shorten the documents befo...
Ahto Buldas, Sven Laur
DIGRA
2005
Springer
14 years 16 days ago
Games, Montage and the First Person Point of View
Interactive montage combines the elements of play and visual representation. The analysis of four examples of interactive montage in reference to a first person point of view high...
Michael Nitsche
JSAC
2006
96views more  JSAC 2006»
13 years 7 months ago
Price-based distributed algorithms for rate-reliability tradeoff in network utility maximization
Abstract--The current framework of network utility maximization for rate allocation and its price-based algorithms assumes that each link provides a fixed-size transmission "p...
Jang-Won Lee, Mung Chiang, A. Robert Calderbank
COMSWARE
2006
IEEE
14 years 1 months ago
Resource management in heterogenous wireless networks with overlapping coverage
— Development in new radio technologies and increase in user demands are driving the deployment of a wide array of wireless networks, ranging from 802.11 networks in the local ar...
Bin Bin Chen, Mun Choon Chan
ECCC
2010
99views more  ECCC 2010»
13 years 7 months ago
A Unified Framework for Testing Linear-Invariant Properties
Abstract--There has been a sequence of recent papers devoted to understanding the relation between the testability of properties of Boolean functions and the invariance of the prop...
Arnab Bhattacharyya, Elena Grigorescu, Asaf Shapir...