Sciweavers

5090 search results - page 102 / 1018
» Constructing Strategies for Programming
Sort
View
114
Voted
ICALP
2005
Springer
15 years 8 months ago
Simple Extractors via Constructions of Cryptographic Pseudo-random Generators
Trevisan has shown that constructions of pseudo-random generators from hard functions (the Nisan-Wigderson approach) also produce extractors. We show that constructions of pseudo-r...
Marius Zimand
131
Voted
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
15 years 8 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page
116
Voted
COCOON
1997
Springer
15 years 6 months ago
Edge and Node Searching Problems on Trees
In this paper, we consider the edge searching and node searching problems on trees. Given a tree, we show a transformation from an optimal node-search strategy to an optimal edge-...
Sheng-Lung Peng, Chin-Wen Ho, Tsan-sheng Hsu, Ming...
118
Voted
ICML
2009
IEEE
16 years 3 months ago
Block-wise construction of acyclic relational features with monotone irreducibility and relevancy properties
We describe an algorithm for constructing a set of acyclic conjunctive relational features by combining smaller conjunctive blocks. Unlike traditional level-wise approaches which ...
Filip Zelezný, Ondrej Kuzelka
105
Voted
SCAM
2008
IEEE
15 years 9 months ago
Constructing Subtle Faults Using Higher Order Mutation Testing
Traditional mutation testing considers only first order mutants, created by the injection of a single fault. Often these first order mutants denote trivial faults that are easil...
Yue Jia, Mark Harman