Sciweavers

520 search results - page 36 / 104
» Reductions Between Expansion Problems
Sort
View
CRYPTO
2004
Springer
108views Cryptology» more  CRYPTO 2004»
14 years 2 months ago
Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?
Many cryptographic primitives begin with parameter generation, which picks a primitive from a family. Such generation can use public coins (e.g., in the discrete-logarithm-based c...
Chun-Yuan Hsiao, Leonid Reyzin
ECIR
2007
Springer
13 years 10 months ago
Static Pruning of Terms in Inverted Files
This paper addresses the problem of identifying collection dependent stop-words in order to reduce the size of inverted files. We present four methods to automatically recognise s...
Roi Blanco, Alvaro Barreiro
CG
2000
Springer
14 years 1 months ago
Lambda-Search in Game Trees - with Application to Go
This paper proposes a new method for searching two-valued (binary) game trees in games like chess or Go. Lambda-search uses null-moves together with different orders of threat-sequ...
Thomas Thomsen
CORR
2010
Springer
130views Education» more  CORR 2010»
13 years 8 months ago
On Polynomial Multiplication in Chebyshev Basis
In a recent paper Lima, Panario and Wang have provided a new method to multiply polynomials in Chebyshev basis which aims at reducing the total number of multiplication when polyn...
Pascal Giorgi
STOC
2005
ACM
145views Algorithms» more  STOC 2005»
14 years 9 months ago
On uniform amplification of hardness in NP
We continue the study of amplification of average-case complexity within NP, and we focus on the uniform case. We prove that if every problem in NP admits an efficient uniform alg...
Luca Trevisan