Sciweavers

4217 search results - page 39 / 844
» The Small Model Property: How Small Can It Be
Sort
View
INFORMATICALT
2002
72views more  INFORMATICALT 2002»
13 years 8 months ago
Simulation of Conflict in an Agent World: Access to Resources and Possibility of Termination of the Population
The goal of the paper is to create a model for investigating the character of relationships between the freedom and restrictions in the terrorism context, in order to find out how ...
Jaak Tepandi
CRYPTO
2004
Springer
139views Cryptology» more  CRYPTO 2004»
14 years 2 months ago
How to Compress Rabin Ciphertexts and Signatures (and More)
Ordinarily, RSA and Rabin ciphertexts and signatures are log N bits, where N is a composite modulus; here, we describe how to “compress” Rabin ciphertexts and signatures (among...
Craig Gentry
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 9 months ago
On Network-Error Correcting Convolutional Codes under the BSC Edge Error Model
Convolutional network-error correcting codes (CNECCs) are known to provide error correcting capability in acyclic instantaneous networks within the network coding paradigm under sm...
K. Prasad, B. Sundar Rajan
CORR
2008
Springer
139views Education» more  CORR 2008»
13 years 9 months ago
The Secrecy Graph and Some of its Properties
A new random geometric graph model, the so-called secrecy graph, is introduced and studied. The graph represents a wireless network and includes only edges over which secure commun...
Martin Haenggi
TGC
2010
Springer
13 years 6 months ago
A Tool for Checking Probabilistic Properties of COWS Services
Abstract. We present a tool developed for fostering probabilistic model checking of services formally specified in Scows, a stochastic enrichment of the Calculus for Orchestration ...
Igor Cappello, Paola Quaglia