Sciweavers

14518 search results - page 188 / 2904
» Two Problems for Sophistication
Sort
View
116
Voted
ASIACRYPT
2008
Springer
15 years 2 months ago
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems
In this paper, we show that two variants of Stern's identification scheme [IEEE Transaction on Information Theory '96] are provably secure against concurrent attack unde...
Akinori Kawachi, Keisuke Tanaka, Keita Xagawa
122
Voted
WCE
2007
15 years 1 months ago
Extended Monotone Methods for Hyperbolic Problems in Three Variables
—We consider Initial-Boundary value problems associated with nonlinear hyperbolic partial differential equation in three independent variables, in a general setting wherein the ...
J. O. Adeyeye, R. Okojie, S. G. Pandit
99
Voted
CORR
2010
Springer
80views Education» more  CORR 2010»
15 years 23 days ago
New Set of Codes for the Maximum-Likelihood Decoding Problem
The maximum-likelihood decoding problem is known to be NP-hard for general linear and Reed-Solomon codes [1, 4]. In this paper, we introduce the notion of A-covered codes, that is...
Morgan Barbier
69
Voted
EOR
2006
52views more  EOR 2006»
15 years 21 days ago
The joint replenishment problem with resource restriction
There are many resource restrictions in real production/inventory systems (for example, budget, storage, transportation capacity, etc.). But unlike other research areas, there is ...
I. K. Moon, B. C. Cha
COMPUTING
2007
78views more  COMPUTING 2007»
15 years 20 days ago
Calculating lower bounds for caching problems
We present a general method for computing lower bounds for various caching problems. We apply the method to two well known problems, companion caching and weighted caching. For we...
Leah Epstein, Rob van Stee