Sciweavers

3116 search results - page 73 / 624
» Recovering
Sort
View
127
Voted
SIGECOM
2003
ACM
92views ECommerce» more  SIGECOM 2003»
15 years 8 months ago
Strategyproof cost-sharing mechanisms for set cover and facility location games
Strategyproof cost-sharing mechanisms, lying in the core, that recover 1/a fraction of the cost, are presented for the set cover and facility location games: a=O(log n) for the fo...
Nikhil R. Devanur, Milena Mihail, Vijay V. Vaziran...
126
Voted
FSE
2003
Springer
110views Cryptology» more  FSE 2003»
15 years 8 months ago
Loosening the KNOT
Abstract. In this paper, we present differential attacks on the selfsynchronizing stream cipher KNOT. Our best attack recovers 96 bits of the secret key with time complexity of 26...
Antoine Joux, Frédéric Muller
137
Voted
ICSM
2002
IEEE
15 years 7 months ago
Atomic Architectural Component Recovery for Program Understanding and Evolution
Component recovery and remodularization is a means to get back control on large and complex legacy systems suffering from ad-hoc changes by recovering logical components and restr...
Rainer Koschke
124
Voted
ICTAI
1996
IEEE
15 years 7 months ago
Automatic Diagnoses for Properly Stratified Knowledge-Bases
We present a mechanism for recovering consistent data from inconsistent set of assertions. For a common family of knowledge-bases we also provide an efficient algorithm for doing ...
Ofer Arieli, Arnon Avron
125
Voted
EUROCRYPT
1997
Springer
15 years 7 months ago
A New Public-Key Cryptosystem
This paper describes a new public-key cryptosystem where the ciphertext is obtained by multiplying the public-keys indexed by the message bits and the cleartext is recovered by fac...
David Naccache, Jacques Stern