Sciweavers

4922 search results - page 864 / 985
» Internet time out
Sort
View
STOC
2009
ACM
133views Algorithms» more  STOC 2009»
16 years 4 months ago
New direct-product testers and 2-query PCPs
The "direct product code" of a function f gives its values on all k-tuples (f(x1), . . . , f(xk)). This basic construct underlies "hardness amplification" in c...
Russell Impagliazzo, Valentine Kabanets, Avi Wigde...
128
Voted
CHI
2009
ACM
16 years 4 months ago
Aurally and visually enhanced audio search with soundtorch
Finding a specific or an artistically appropriate sound in a vast collection comprising thousands of audio files containing recordings of, say, footsteps, gunshots, and thundercla...
Sebastian Heise, Michael Hlatky, Jörn Lovisca...
PODC
2009
ACM
16 years 4 months ago
Load balancing without regret in the bulletin board model
We analyze the performance of protocols for load balancing in distributed systems based on no-regret algorithms from online learning theory. These protocols treat load balancing a...
Éva Tardos, Georgios Piliouras, Robert D. K...
125
Voted
TCC
2009
Springer
132views Cryptology» more  TCC 2009»
16 years 4 months ago
Authenticated Adversarial Routing
: The aim of this paper is to demonstrate the feasibility of authenticated throughput-ecient routing in an unreliable and dynamically changing synchronous network in which the majo...
Yair Amir, Paul Bunn, Rafail Ostrovsky
PKC
2009
Springer
116views Cryptology» more  PKC 2009»
16 years 4 months ago
Improving the Boneh-Franklin Traitor Tracing Scheme
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra