Sciweavers

3116 search results - page 73 / 624
» Recovering
Sort
View
SIGECOM
2003
ACM
92views ECommerce» more  SIGECOM 2003»
14 years 1 months ago
Strategyproof cost-sharing mechanisms for set cover and facility location games
Strategyproof cost-sharing mechanisms, lying in the core, that recover 1/a fraction of the cost, are presented for the set cover and facility location games: a=O(log n) for the fo...
Nikhil R. Devanur, Milena Mihail, Vijay V. Vaziran...
FSE
2003
Springer
110views Cryptology» more  FSE 2003»
14 years 1 months ago
Loosening the KNOT
Abstract. In this paper, we present differential attacks on the selfsynchronizing stream cipher KNOT. Our best attack recovers 96 bits of the secret key with time complexity of 26...
Antoine Joux, Frédéric Muller
ICSM
2002
IEEE
14 years 24 days ago
Atomic Architectural Component Recovery for Program Understanding and Evolution
Component recovery and remodularization is a means to get back control on large and complex legacy systems suffering from ad-hoc changes by recovering logical components and restr...
Rainer Koschke
ICTAI
1996
IEEE
14 years 16 hour ago
Automatic Diagnoses for Properly Stratified Knowledge-Bases
We present a mechanism for recovering consistent data from inconsistent set of assertions. For a common family of knowledge-bases we also provide an efficient algorithm for doing ...
Ofer Arieli, Arnon Avron
EUROCRYPT
1997
Springer
14 years 13 hour ago
A New Public-Key Cryptosystem
This paper describes a new public-key cryptosystem where the ciphertext is obtained by multiplying the public-keys indexed by the message bits and the cleartext is recovered by fac...
David Naccache, Jacques Stern