—Straightforward implementations of cryptographic algorithms are known to be vulnerable to attacks aimed not at the mathematical structure of the cipher but rather at the weak po...
Russell and Wang [22] recently introduced an elegant, information-theoretic notion called entropic security of encryption: they required that the cipher text leak no predicate of ...
Because of the growing importance of concurrent programming, many people are trying to figure out where in the curriculum to introduce students to concurrency. In this paper we di...
Kim B. Bruce, Andrea Pohoreckyj Danyluk, Thomas P....
Existing work on limited feedback for cooperative multicell beamforming quantizes the desired and interfering channel state information (CSI) using separate codebooks. In this pap...
Ramya Bhagavatula, Robert W. Heath Jr., Bhaskar D....
The Turing and many-one completeness notions for NP have been previously separated under measure, genericity, and bi-immunity hypotheses on NP. The proofs of all these results rel...
John M. Hitchcock, Aduri Pavan, N. V. Vinodchandra...