Sciweavers

406 search results - page 27 / 82
» Pseudorandomness and Combinatorial Constructions
Sort
View
TCC
2010
Springer
166views Cryptology» more  TCC 2010»
14 years 8 months ago
Public-Key Encryption Schemes with Auxiliary Inputs
We construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one t...
Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kala...
ESANN
2006
14 years 16 days ago
Rotation-based ensembles of RBF networks
Abstract. Ensemble methods allow to improve the accuracy of classification methods. This work considers the application of one of these methods, named Rotation-based, when the clas...
Juan José Rodríguez, Jesús Ma...
BSL
2010
13 years 8 months ago
Almost disjoint families and diagonalizations of length continuum
Abstract. We present a survey of some results and problems concerning constructions which require a diagonalization of length continuum to be carried out, particularly construction...
Dilip Raghavan
GECCO
2005
Springer
124views Optimization» more  GECCO 2005»
14 years 4 months ago
Generalized benchmark generation for dynamic combinatorial problems
Several general purpose benchmark generators are now available in the literature. They are convenient tools in dynamic continuous optimization as they can produce test instances w...
Abdulnasser Younes, Paul H. Calamai, Otman A. Basi...
AAAI
2010
14 years 18 days ago
Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates
For many election systems, bribery (and related) attacks have been shown NP-hard using constructions on combinatorially rich structures such as partitions and covers. It is import...
Felix Brandt, Markus Brill, Edith Hemaspaandra, La...