Sciweavers

7840 search results - page 1419 / 1568
» On generalized Ramsey numbers
Sort
View
EUROCRYPT
2010
Springer
14 years 1 months ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
ICALP
2010
Springer
14 years 1 months ago
Additive Spanners in Nearly Quadratic Time
We consider the problem of efficiently finding an additive C-spanner of an undirected unweighted graph G, that is, a subgraph H so that for all pairs of vertices u, v, δH (u, v) ...
David P. Woodruff
ICSE
2010
IEEE-ACM
14 years 1 months ago
Test generation through programming in UDITA
We present an approach for describing tests using nondeterministic test generation programs. To write such programs, we introduce UDITA, a Java-based language with non-determinist...
Milos Gligoric, Tihomir Gvero, Vilas Jagannath, Sa...
MDM
2010
Springer
152views Communications» more  MDM 2010»
14 years 1 months ago
Finding One-Of Probably Nearest Neighbors with Minimum Location Updates
—Location information is necessarily uncertain when objects are constantly moving. The cost can be high to maintain precise locations at the application server for all the object...
Mitzi McCarthy, Xiaoyang Sean Wang, Zhen He
NOSSDAV
2010
Springer
14 years 1 months ago
Towards understanding the external links of video sharing sites: measurement and analysis
Recently, many video sharing sites provide external links so that their video or audio contents can be embedded into external web sites. For example, users can copy the embedded U...
Kunfeng Lai, Dan Wang
« Prev « First page 1419 / 1568 Last » Next »