Sciweavers

178 search results - page 35 / 36
» Randomized Simulation of Hybrid Systems For Circuit Validati...
Sort
View
CRYPTO
2011
Springer
180views Cryptology» more  CRYPTO 2011»
12 years 7 months ago
Leakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
Sanjam Garg, Abhishek Jain 0002, Amit Sahai
JSAC
2011
123views more  JSAC 2011»
12 years 10 months ago
The Asymptotic Behavior of Minimum Buffer Size Requirements in Large P2P Streaming Networks
—The growth of real-time content streaming over the Internet has resulted in the use of peer-to-peer (P2P) approaches for scalable content delivery. In such P2P streaming systems...
Srinivas Shakkottai, R. Srikant, Lei Ying
TON
2012
11 years 10 months ago
Declarative Policy-Based Adaptive Mobile Ad Hoc Networking
—This paper presents DAWN, a declarative platform that creates highly adaptive policy-based MANET protocols. DAWN leverages declarative networking techniques to achieve extensibl...
Changbin Liu, Ricardo Correa, Xiaozhou Li, Prithwi...
BMCBI
2008
78views more  BMCBI 2008»
13 years 7 months ago
Deducing topology of protein-protein interaction networks from experimentally measured sub-networks
Background: Protein-protein interaction networks are commonly sampled using yeast two hybrid approaches. However, whether topological information reaped from these experimentallym...
Ling Yang, Thomas M. Vondriska, Zhangang Han, W. R...
DAC
2010
ACM
13 years 10 months ago
Scalable specification mining for verification and diagnosis
Effective system verification requires good specifications. The lack of sufficient specifications can lead to misses of critical bugs, design re-spins, and time-to-market slips. I...
Wenchao Li, Alessandro Forin, Sanjit A. Seshia