Sciweavers

15614 search results - page 3110 / 3123
» The State of State
Sort
View
DC
2011
12 years 8 months ago
Distributed algorithms for covering, packing and maximum weighted matching
Abstract This paper gives poly-logarithmic-round, distributed δ-approximation algorithms for covering problems with submodular cost and monotone covering constraints (Submodular-c...
Christos Koufogiannakis, Neal E. Young
DNA
2011
Springer
227views Bioinformatics» more  DNA 2011»
12 years 8 months ago
Cooperative Assembly Systems
Several molecular systems form large-scale objects. One would like to understand their assembly and how this assembly is regulated. As a first step, we investigate the phase trans...
Vincent Danos, Heinz Koeppl, John Wilson-Kanamori
EMSOFT
2011
Springer
12 years 8 months ago
Model-checking behavioral programs
System specifications are often structured as collections of scenarios and use-cases that describe desired and forbidden sequences of events. A recently proposed behavioral progr...
David Harel, Robby Lampert, Assaf Marron, Gera Wei...
GAMESEC
2011
344views Game Theory» more  GAMESEC 2011»
12 years 8 months ago
Aegis A Novel Cyber-Insurance Model
Recent works on Internet risk management have proposed the idea of cyber-insurance to eliminate risks due to security threats, which cannot be tackled through traditional means suc...
Ranjan Pal, Leana Golubchik, Konstantinos Psounis
IACR
2011
115views more  IACR 2011»
12 years 8 months ago
Multi-Server Oblivious RAM
Secure two-party computation protocol allows two players, Alice with secret input x and Bob with secret input y, to jointly execute an arbitrary program π(x, y) such that only th...
Steve Lu, Rafail Ostrovsky
« Prev « First page 3110 / 3123 Last » Next »