Sciweavers

1679 search results - page 97 / 336
» Strong order equivalence
Sort
View
ACNS
2005
Springer
94views Cryptology» more  ACNS 2005»
14 years 3 months ago
Optimal Asymmetric Encryption and Signature Paddings
Strong security notions often introduce strong constraints on the construction of cryptographic schemes: semantic security implies probabilistic encryption, while the resistance to...
Benoît Chevallier-Mames, Duong Hieu Phan, Da...
GLOBECOM
2009
IEEE
14 years 4 months ago
Capacity Gains of Some Frequency Reuse Schemes in OFDMA Networks
—The downlink capacity of cellular networks is known to be strongly limited by inter-cell interference. In order to mitigate this interference, a number of frequency reuse scheme...
Thomas Bonald, Nidhi Hegde
SPAA
2010
ACM
14 years 2 months ago
Multi-sided shared coins and randomized set-agreement
This paper presents wait-free randomized algorithms for solving set-agreement in asynchronous shared-memory systems under a strong adversary. First, the definition of a shared-co...
Keren Censor Hillel
EUROSPI
2006
Springer
14 years 1 months ago
Implementing an ISO 9001 Certified Process
Abstract. This paper presents a case study of how a Norwegian company introduced an ISO certified process. By identifying the company's strong and weak sides plus the expectat...
Tor Stålhane
JCT
2007
85views more  JCT 2007»
13 years 10 months ago
Separating systems and oriented graphs of diameter two
We prove results on the size of weakly and strongly separating set systems and matrices, and on cross-intersecting systems. As a consequence, we improve on a result of Katona and ...
Béla Bollobás, Alex D. Scott