Sciweavers

2315 search results - page 399 / 463
» Does EigenPalm work
Sort
View
EUROCRYPT
2003
Springer
14 years 1 months ago
Resettable Zero-Knowledge in the Weak Public-Key Model
A new public-key model for resettable zero-knowledge (rZK) protocols, which is an extension and generalization of the upper-bounded public-key (UPK) model introduced by Micali and ...
Yunlei Zhao, Xiaotie Deng, Chan H. Lee, Hong Zhu
GECCO
2003
Springer
132views Optimization» more  GECCO 2003»
14 years 1 months ago
Evolutionary Multimodal Optimization Revisited
Abstract. We revisit a class of multimodal function optimizations using evolutionary algorithms reformulated into a multiobjective framework where previous implementations have nee...
Rajeev Kumar, Peter Rockett
HYBRID
2010
Springer
14 years 1 months ago
Safe compositional network sketches: formal framework
NetSketch is a tool for the specification of constrained-flow applications and the certification of desirable safety properties imposed thereon. NetSketch assists system integr...
Azer Bestavros, Assaf J. Kfoury, Andrei Lapets, Mi...
ITNG
2010
IEEE
14 years 29 days ago
D-SeDGAM: A Dynamic Service Differentiation Based GTS Allocation Mechanism for IEEE 802.15.4 WSN
—The plethora of applications for Wireless Sensor Networks (WSN) has experienced significant growth in recent years. Every application has a different set of requirements and it ...
Berta Carballido Villaverde, Susan Rea, Dirk Pesch
STOC
2010
ACM
227views Algorithms» more  STOC 2010»
14 years 22 days ago
On the Round Complexity of Covert Computation
In STOC’05, von Ahn, Hopper and Langford introduced the notion of covert computation. In covert computation, a party runs a secure computation protocol over a covert (or stegano...
Vipul Goyal and Abhishek Jain