Sciweavers

194 search results - page 23 / 39
» Randomness for Free
Sort
View
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 3 months ago
Finding Cycles and Trees in Sublinear Time
We present sublinear-time (randomized) algorithms for finding simple cycles of length at least k 3 and tree-minors in bounded-degree graphs. The complexity of these algorithms is...
Artur Czumaj, Oded Goldreich, Dana Ron, C. Seshadh...
IPCCC
2007
IEEE
14 years 2 months ago
Peer-to-Peer Multimedia Streaming Using BitTorrent
We propose a peer-to-peer multimedia streaming solution based on the BitTorrent content-distribution protocol. Our proposal includes two modifications that allow it to deliver mul...
Purvi Shah, Jehan-François Pâris
CANDC
2009
ACM
14 years 2 months ago
Subliminal wiretapping
Subliminal Wiretapping is a subtly interactive artwork that utilizes random number generation modified through mindmatter effects to supply a continuous stream of words. Frequent,...
Shawn Lawson
GLOBECOM
2009
IEEE
14 years 9 days ago
Adding Integrity Verification Capabilities to the LDPC-Staircase Erasure Correction Codes
File distribution is becoming a key technology, in particular in large scale content broadcasting systems like DVBH/SH. They largely rely on Application Level FEC codes (ALFEC) in ...
Mathieu Cunche, Vincent Roca
CISC
2007
Springer
129views Cryptology» more  CISC 2007»
14 years 11 days ago
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...
Chunxiang Gu, Yuefei Zhu, Heng Pan