Sciweavers

2315 search results - page 325 / 463
» Does EigenPalm work
Sort
View
CALCO
2009
Springer
161views Mathematics» more  CALCO 2009»
14 years 2 months ago
Free Heyting Algebras: Revisited
Abstract. We use coalgebraic methods to describe finitely generated free Heyting algebras. Heyting algebras are axiomatized by rank 0-1 axioms. In the process of constructing free...
Nick Bezhanishvili, Mai Gehrke
COCO
2009
Springer
128views Algorithms» more  COCO 2009»
14 years 2 months ago
Inapproximability of Vertex Cover and Independent Set in Bounded Degree Graphs
We study the inapproximability of Vertex Cover and Independent Set on degree d graphs. We prove that: • Vertex Cover is Unique Games-hard to approximate to within a factor 2−(...
Per Austrin, Subhash Khot, Muli Safra
CRYPTO
2009
Springer
87views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Reconstructing RSA Private Keys from Random Key Bits
sion of an extended abstract published in Proceedings of Crypto 2009, Springer-Verlag, 2009. Available from the IACR Cryptology ePrint Archive as Report 2008/510. We show that an ...
Nadia Heninger, Hovav Shacham
ISW
2009
Springer
14 years 2 months ago
Robust Authentication Using Physically Unclonable Functions
Abstract. In this work we utilize a physically unclonable function (PUF) to improve resilience of authentication protocols to various types of compromise. As an example application...
Keith B. Frikken, Marina Blanton, Mikhail J. Atall...
KIVS
2009
Springer
14 years 2 months ago
Practical Rate-Based Congestion Control for Wireless Mesh Networks
We introduce an adaptive pacing scheme to overcome the drawbacks of TCP in wireless mesh networks with Internet connectivity. The pacing scheme is implemented at the wireless TCP s...
Sherif M. ElRakabawy, Christoph Lindemann