Sciweavers

534 search results - page 19 / 107
» One more bit is enough
Sort
View
COCO
2010
Springer
153views Algorithms» more  COCO 2010»
13 years 12 months ago
Communication Complexity with Synchronized Clocks
Abstract—We consider two natural extensions of the communication complexity model that are inspired by distributed computing. In both models, two parties are equipped with synchr...
Russell Impagliazzo, Ryan Williams
CRYPTO
2006
Springer
125views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
On the Higher Order Nonlinearities of Algebraic Immune Functions
Abstract. One of the most basic requirements concerning Boolean functions used in cryptosystems is that they must have high algebraic degrees. This simple criterion is not always w...
Claude Carlet
CRYPTO
2006
Springer
89views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Oblivious Transfer and Linear Functions
Abstract. We study unconditionally secure 1-out-of-2 Oblivious Transfer (1-2 OT). We first point out that a standard security requirement for 1-2 OT of bits, namely that the receiv...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
CEE
2008
91views more  CEE 2008»
13 years 8 months ago
Self-adapting algorithm to fair time sharing in wireless access networks
To adapt the data rate in accordance with the quality of the link, the IEEE 802.11 standard proposes the variable rate shifting functionality. This intrinsic functionality of the ...
Anelise Munaretto, Mauro Fonseca
COMBINATORICS
2000
88views more  COMBINATORICS 2000»
13 years 7 months ago
Note on Sparse Random Graphs and Cover Graphs
It is shown in this note that with high probability it is enough to destroy all triangles in order to get a cover graph from a random graph Gn,p with p log n/n for any constant ...
Tom Bohman, Alan M. Frieze, Miklós Ruszink&...