Sciweavers

130 search results - page 20 / 26
» How to Encrypt with a Malicious Random Number Generator
Sort
View
COLT
1998
Springer
14 years 29 days ago
Learning One-Variable Pattern Languages in Linear Average Time
A new algorithm for learning one-variable pattern languages is proposed and analyzed with respect to its average-case behavior. We consider the total learning time that takes into...
Rüdiger Reischuk, Thomas Zeugmann
VLDB
2007
ACM
119views Database» more  VLDB 2007»
14 years 2 months ago
Integrity Auditing of Outsourced Data
An increasing number of enterprises outsource their IT services to third parties who can offer these services for a much lower cost due to economy of scale. Quality of service is ...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
INFOCOM
2000
IEEE
14 years 1 months ago
The Chaotic Nature of TCP Congestion Control
— In this paper we demonstrate how TCP congestion control can show chaotic behavior. We demonstrate the major features of chaotic systems in TCP/IP networks with examples. These ...
Andras Veres, Miklós Boda
PADL
2012
Springer
12 years 4 months ago
Virtualizing Real-World Objects in FRP
We begin with a functional reactive programming (FRP) model in which every program is viewed as a signal function that converts a stream of input values into a stream of output va...
Daniel Winograd-Cort, Hai Liu, Paul Hudak
DAC
2000
ACM
14 years 9 months ago
Fingerprinting intellectual property using constraint-addition
Recently, intellectual property protection (IPP) techniques attracted a great deal of attention from semiconductor, system integration and software companies. A number of watermar...
Gang Qu, Miodrag Potkonjak