Sciweavers

2181 search results - page 86 / 437
» The restriction scaffold problem
Sort
View
CADE
2005
Springer
14 years 10 months ago
Regular Protocols and Attacks with Regular Knowledge
We prove that, if the initial knowledge of the intruder is given by a deterministic bottom-up tree automaton, then the insecurity problem for cryptographic protocols with atomic ke...
Tomasz Truderung
WETICE
2009
IEEE
14 years 4 months ago
A Game Theoretical Approach in Securing P2P Storage against Whitewashers
—An inherent problem to a cooperation incentive mechanism implemented into a dynamic system where peers may join or leave at any time is the whitewashing problem. Whitewashers ar...
Nouha Oualha, Yves Roudier
ICASSP
2008
IEEE
14 years 4 months ago
Constrained nonlinear minimum mse estimation
We address the problem of minimum mean-squared error (MMSE) estimation where the estimator is constrained to belong to a prede ned set of functions. We derive a simple closed form...
Tomer Michaeli, Yonina C. Eldar
COCOON
2005
Springer
14 years 3 months ago
Algorithms for Terminal Steiner Trees
The terminal Steiner tree problem (TST) consists of finding a minimum cost Steiner tree where each terminal is a leaf. We describe a factor 2ρ−ρ/(3ρ−2) approximation algor...
Fábio Viduani Martinez, José Coelho ...
FCT
2005
Springer
14 years 3 months ago
A Self-dependency Constraint in the Simply Typed Lambda Calculus
We consider terms of simply typed lambda calculus in which copy of a subterm may not be inserted to the argument of itself during the reduction. The terms form wide class which inc...
Aleksy Schubert