Sciweavers

5255 search results - page 941 / 1051
» Formal Methods for Privacy
Sort
View
112
Voted
CIA
2006
Springer
15 years 6 months ago
The Distortion of Cardinal Preferences in Voting
The theoretical guarantees provided by voting have distinguished it as a prominent method of preference aggregation among autonomous agents. However, unlike humans, agents usually ...
Ariel D. Procaccia, Jeffrey S. Rosenschein
121
Voted
CRYPTO
2006
Springer
92views Cryptology» more  CRYPTO 2006»
15 years 6 months ago
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
In this paper we formalize a general model of cryptanalytic time/memory tradeoffs for the inversion of a random function f : {0, 1, . . . , N - 1} {0, 1, . . . , N - 1}. The model...
Elad Barkan, Eli Biham, Adi Shamir
127
Voted
DICS
2006
15 years 6 months ago
Algorithms for Failure Protection in Large IP-over-fiber and Wireless Ad Hoc Networks
We address failure location and restoration in both optical and wireless ad hoc networks. First, we show how Maximum Likelihood inference can improve failure location algorithms in...
Frederick Ducatelle, Luca Maria Gambardella, Macie...
120
Voted
DSD
2006
IEEE
95views Hardware» more  DSD 2006»
15 years 6 months ago
Towards Performance-Oriented Pattern-Based Refinement of Synchronous Models onto NoC Communication
We present a performance-oriented refinement approach that refines a perfectly synchronous communication model onto Network-on-Chip (NoC) communication. We first identify four bas...
Zhonghai Lu, Ingo Sander, Axel Jantsch
107
Voted
ECAI
2006
Springer
15 years 6 months ago
Resolving Conflicts in Action Descriptions
Abstract. We study resolving conflicts between an action description and a set of conditions (possibly obtained from observations), in the context of action languages. In this form...
Thomas Eiter, Esra Erdem, Michael Fink, Ján...