Sciweavers

82 search results - page 16 / 17
» On generalized separating hash families
Sort
View
TCC
2009
Springer
141views Cryptology» more  TCC 2009»
14 years 7 months ago
Weak Verifiable Random Functions
Verifiable random functions (VRFs), introduced by Micali, Rabin and Vadhan, are pseudorandom functions in which the owner of the seed produces a public-key that constitutes a commi...
Zvika Brakerski, Shafi Goldwasser, Guy N. Rothblum...
STOC
2010
ACM
200views Algorithms» more  STOC 2010»
14 years 4 months ago
Hardness Amplification in Proof Complexity
We present a generic method for converting any family of unsatisfiable CNF formulas that require large resolution rank into CNF formulas whose refutation requires large rank for p...
Paul Beame, Trinh Huynh and Toniann Pitassi
CCECE
2006
IEEE
14 years 20 days ago
Evaluation of RNA Secondary Structure Motifs using Regression Analysis
Recent experimental evidences have shown that ribonucleic acid (RNA) plays a greater role in the cell than previously thought. An ensemble of RNA sequences believed to contain sig...
Mohammad Anwar, Marcel Turcotte
STOC
2002
ACM
156views Algorithms» more  STOC 2002»
14 years 6 months ago
Selfish traffic allocation for server farms
We investigate the price of selfish routing in non-cooperative networks in terms of the coordination and bicriteria ratios in the recently introduced game theoretic network model ...
Artur Czumaj, Piotr Krysta, Berthold Vöcking
SIGCPR
2006
ACM
106views Hardware» more  SIGCPR 2006»
14 years 16 days ago
Cross-cultural influences on women in the IT workforce
A review of 862 papers published in SIGMIS/CPR proceedings over the past 44 years revealed only 29 articles that focused on gender and the IT workforce or gender and IT education,...
Eileen M. Trauth, Jeria L. Quesenberry, Haiyan Hua...