Sciweavers

915 search results - page 18 / 183
» Proof labeling schemes
Sort
View
ESA
2009
Springer
77views Algorithms» more  ESA 2009»
14 years 2 months ago
Short Labels for Lowest Common Ancestors in Trees
We evaluate the practical performance of labeling schemes for lowest common ancestors in trees. We develop different variants for encoding the labels. We then perform a thorough e...
Johannes Fischer
TCC
2009
Springer
141views Cryptology» more  TCC 2009»
14 years 8 months ago
Proofs of Retrievability via Hardness Amplification
Proofs of Retrievability (PoR), introduced by Juels and Kaliski [JK07], allow the client to store a file F on an untrusted server, and later run an efficient audit protocol in whi...
Yevgeniy Dodis, Salil P. Vadhan, Daniel Wichs
ISCAS
2002
IEEE
86views Hardware» more  ISCAS 2002»
14 years 23 days ago
On the optimal labeling for pseudo-chaotic phase hopping
In this paper we introduce the PCPH (Pseudo-Chaotic Phase Hopping) telecommunication scheme, which is obtained by combining pseudo-chaotic encoding with N-ary phase shift keying. ...
Zbigniew Galias, Gian Mario Maggio
LREC
2010
155views Education» more  LREC 2010»
13 years 9 months ago
Towards a Standardized Linguistic Annotation of the Textual Content of Labels in Knowledge Representation Systems
We propose applying standardized linguistic annotation to terms included in labels of knowledge representation schemes (taxonomies or ontologies), hypothesizing that this would he...
Thierry Declerck, Piroska Lendvai
DIMVA
2010
13 years 9 months ago
Conqueror: Tamper-Proof Code Execution on Legacy Systems
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Co...
Lorenzo Martignoni, Roberto Paleari, Danilo Brusch...