Sciweavers

544 search results - page 69 / 109
» The Algebra of Equality Proofs
Sort
View
IWFM
2003
13 years 9 months ago
Using Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic prot...
Stéphane Lafrance, John Mullins
CORR
2010
Springer
131views Education» more  CORR 2010»
13 years 6 months ago
Ideal forms of Coppersmith's theorem and Guruswami-Sudan list decoding
: We develop a framework for solving polynomial equations with size constraints on solutions. We obtain our results by showing how to apply a technique of Coppersmith for finding ...
Henry Cohn, Nadia Heninger
LICS
2010
IEEE
13 years 6 months ago
Addition-Invariant FO and Regularity
We consider formulas which, in addition to the symbols in the vocabulary, may use two designated symbols ≺ and + that must be interpreted as a linear order and its associated ad...
Nicole Schweikardt, Luc Segoufin
STOC
2002
ACM
107views Algorithms» more  STOC 2002»
14 years 8 months ago
Quantum lower bound for the collision problem
The collision problem is to decide whether a function X : {1, . . . , n} {1, . . . , n} is one-to-one or two-to-one, given that one of these is the case. We show a lower bound of...
Scott Aaronson
ISCAS
2007
IEEE
110views Hardware» more  ISCAS 2007»
14 years 2 months ago
On the degree of MIMO systems
Abstract— MIMO channels and wireless communications systems have generated a great deal of renewed interest in linear system theory. This paper presents two results. The first i...
P. P. Vaidyanathan