Sciweavers

79 search results - page 8 / 16
» The Last Fraction of a Fractional Conjecture
Sort
View
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
SASO
2010
IEEE
13 years 5 months ago
Distributed Control for Small Customer Energy Demand Management
We present the ColoredPower algorithm, which is designed to provide collaborative electricity demand shaping for residential and small-business customers. Demand shaping for this m...
Vinayak V. Ranade, Jacob Beal
NETWORK
2010
153views more  NETWORK 2010»
13 years 2 months ago
Sizing up online social networks
While the size of popular Online Social Networks (OSNs) such as MySpace or Twitter has been reported to be in the tens or hundreds of millions of users (and growing), little is kn...
Reza Rejaie, Mojtaba Torkjazi, Masoud Valafar, Wal...
JPDC
2006
148views more  JPDC 2006»
13 years 7 months ago
Efficient algorithm for placing a given number of base stations to cover a convex region
In the context of mobile communication, an efficient algorithm for the base-station placement problem is developed in this paper. The objective is to place a given number of base-...
Gautam K. Das, Sandip Das, Subhas C. Nandy, Bhaban...
SIGECOM
2008
ACM
220views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Better redistribution with inefficient allocation in multi-unit auctions with unit demand
For the problem of allocating one or more items among a group of competing agents, the Vickrey-Clarke-Groves (VCG) mechanism is strategy-proof and efficient. However, the VCG mech...
Mingyu Guo, Vincent Conitzer