Sciweavers

706 search results - page 61 / 142
» List Decoding: Algorithms and Applications
Sort
View
JSAC
2006
155views more  JSAC 2006»
13 years 7 months ago
Cross-Layer Optimized Video Streaming Over Wireless Multihop Mesh Networks
Abstract--The proliferation of wireless multihop communication infrastructures in office or residential environments depends on their ability to support a variety of emerging appli...
Yiannis Andreopoulos, Nicholas Mastronarde, Mihael...
CAV
2012
Springer
270views Hardware» more  CAV 2012»
11 years 10 months ago
Automated Termination Proofs for Java Programs with Cyclic Data
Abstract. In earlier work, we developed a technique to prove termination of Java programs automatically: first, Java programs are automatically transformed to term rewrite systems...
Marc Brockschmidt, Richard Musiol, Carsten Otto, J...
PKC
2009
Springer
126views Cryptology» more  PKC 2009»
14 years 8 months ago
Verifiable Rotation of Homomorphic Encryptions
Similar to verifiable shuffling (or, mixing), we consider the problem of verifiable rotating (and random re-encrypting) a given list of homomorphic encryptions. The offset by which...
Sebastiaan de Hoogh, Berry Schoenmakers, Boris Sko...
ECCC
1998
118views more  ECCC 1998»
13 years 7 months ago
Chinese Remaindering with Errors
The Chinese Remainder Theorem states that a positive integer m is uniquely speci ed by its remainder modulo k relatively prime integers p1;:::;pk, provided m < Qk i=1 pi. Thus ...
Oded Goldreich, Dana Ron, Madhu Sudan
SODA
2004
ACM
115views Algorithms» more  SODA 2004»
13 years 9 months ago
Minimizing the stabbing number of matchings, trees, and triangulations
The (axis-parallel) stabbing number of a given set of line segments is the maximum number of segments that can be intersected by any one (axis-parallel) line. We investigate probl...
Sándor P. Fekete, Marco E. Lübbecke, H...