Sciweavers

3602 search results - page 604 / 721
» Isn't It About Time
Sort
View
STOC
2009
ACM
159views Algorithms» more  STOC 2009»
14 years 10 months ago
Message passing algorithms and improved LP decoding
Linear programming decoding for low-density parity check codes (and related domains such as compressed sensing) has received increased attention over recent years because of its p...
Sanjeev Arora, Constantinos Daskalakis, David Steu...
CHI
2009
ACM
14 years 10 months ago
Coralog: use-aware visualization connecting human micro-activities to environmental change
This paper describes the goal, design approach and specification, and preliminary use test of a use-aware ambient media called Coralog. Coralog is a widget which detects the durat...
Tanyoung Kim, Hwajung Hong, Brian Magerko
EUROCRYPT
2009
Springer
14 years 10 months ago
On the Portability of Generalized Schnorr Proofs
The notion of Zero Knowledge Proofs (of knowledge) [ZKP] is central to cryptography; it provides a set of security properties that proved indispensable in concrete protocol design...
Jan Camenisch, Aggelos Kiayias, Moti Yung
PODS
2009
ACM
86views Database» more  PODS 2009»
14 years 10 months ago
Reverse data exchange: coping with nulls
An inverse of a schema mapping M is intended to "undo" what M does, thus providing a way to perform "reverse" data exchange. In recent years, three different f...
Ronald Fagin, Phokion G. Kolaitis, Lucian Popa, Wa...
MOBIHOC
2009
ACM
14 years 10 months ago
Secure multidimensional range queries in sensor networks
Most future large-scale sensor networks are expected to follow a two-tier architecture which consists of resource-rich master nodes at the upper tier and resource-poor sensor node...
Rui Zhang, Jing Shi, Yanchao Zhang