Sciweavers

2131 search results - page 15 / 427
» Immunity for Closed Sets
Sort
View
LOGCOM
2007
72views more  LOGCOM 2007»
13 years 9 months ago
Post's Programme for the Ershov Hierarchy
This paper extends Post’s programme to finite levels of the Ershov hierarchy of ∆2 sets. Our initial characterisation, in the spirit of Post [27], of the degrees of the immune...
Bahareh Afshari, George Barmpalias, S. Barry Coope...
DCC
2000
IEEE
13 years 9 months ago
Relating Differential Distribution Tables to Other Properties of of Substitution Boxes
Due to the success of differential and linear attacks on a large number of encryption algorithms, it is importanttoinvestigaterelationshipsamongvariouscryptographic, includingdiffe...
Xian-Mo Zhang, Yuliang Zheng, Hideki Imai
EUROCRYPT
2004
Springer
14 years 3 months ago
Immunizing Encryption Schemes from Decryption Errors
We provide methods for transforming an encryption scheme susceptible to decryption errors into one that is immune to these errors. Immunity to decryption errors is vital when const...
Cynthia Dwork, Moni Naor, Omer Reingold
ICAS
2006
IEEE
207views Robotics» more  ICAS 2006»
14 years 3 months ago
Biologically-Inspired Design of Autonomous and Adaptive Grid Services
Abstract—This paper describes and evaluates a biologically-inspired network architecture that allows grid services to autonomously adapt to dynamic environment changes in the net...
Chonho Lee, Junichi Suzuki
CORR
2010
Springer
117views Education» more  CORR 2010»
13 years 10 months ago
Stability of Reeb graphs under function perturbations: the case of closed curves
ABSTRACT. Reeb graphs provide a method for studying the shape of a manifold by encoding the evolution and arrangement of level sets of a simple Morse function defined on
Barbara Di Fabio, Claudia Landi