Sciweavers

14518 search results - page 188 / 2904
» Two Problems for Sophistication
Sort
View
ASIACRYPT
2008
Springer
14 years 24 days ago
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems
In this paper, we show that two variants of Stern's identification scheme [IEEE Transaction on Information Theory '96] are provably secure against concurrent attack unde...
Akinori Kawachi, Keisuke Tanaka, Keita Xagawa
WCE
2007
13 years 12 months ago
Extended Monotone Methods for Hyperbolic Problems in Three Variables
—We consider Initial-Boundary value problems associated with nonlinear hyperbolic partial differential equation in three independent variables, in a general setting wherein the ...
J. O. Adeyeye, R. Okojie, S. G. Pandit
CORR
2010
Springer
80views Education» more  CORR 2010»
13 years 11 months ago
New Set of Codes for the Maximum-Likelihood Decoding Problem
The maximum-likelihood decoding problem is known to be NP-hard for general linear and Reed-Solomon codes [1, 4]. In this paper, we introduce the notion of A-covered codes, that is...
Morgan Barbier
EOR
2006
52views more  EOR 2006»
13 years 10 months ago
The joint replenishment problem with resource restriction
There are many resource restrictions in real production/inventory systems (for example, budget, storage, transportation capacity, etc.). But unlike other research areas, there is ...
I. K. Moon, B. C. Cha
COMPUTING
2007
78views more  COMPUTING 2007»
13 years 10 months ago
Calculating lower bounds for caching problems
We present a general method for computing lower bounds for various caching problems. We apply the method to two well known problems, companion caching and weighted caching. For we...
Leah Epstein, Rob van Stee