Sciweavers

2168 search results - page 176 / 434
» Using Approximation Hardness to Achieve Dependable Computati...
Sort
View
FOCS
2008
IEEE
15 years 11 months ago
Leakage-Resilient Cryptography
We construct a stream-cipher SC whose implementation is secure even if a bounded amount of arbitrary (adaptively, adversarially chosen) information about the internal state of SC ...
Stefan Dziembowski, Krzysztof Pietrzak
STOC
2010
ACM
199views Algorithms» more  STOC 2010»
15 years 9 months ago
Zero-One Frequency Laws
Data streams emerged as a critical model for multiple applications that handle vast amounts of data. One of the most influential and celebrated papers in streaming is the “AMSâ...
Vladimir Braverman and Rafail Ostrovsky
ICIP
2001
IEEE
16 years 6 months ago
On the compression of two-dimensional piecewise smooth functions
It is well known that wavelets provide good non-linear approximation of one-dimensional (1-D) piecewise smooth functions. However, it has been shown that the use of a basis with g...
Pier Luigi Dragotti, Minh N. Do, Rahul Shukla, Mar...
SIGMETRICS
2010
ACM
197views Hardware» more  SIGMETRICS 2010»
15 years 9 months ago
Coloring spatial point processes with applications to peer discovery in large wireless networks
In this paper, we study distributed channel assignment in wireless networks with applications to peer discovery in ad hoc wireless networks. We model channel assignment as a color...
Jian Ni, R. Srikant, Xinzhou Wu
ACSC
2006
IEEE
15 years 10 months ago
Modelling layer 2 and layer 3 device bandwidths using B-node theory
Modern computer networks contain an amalgamation of devices and technologies, with the performance exhibited by each central to digital communications. Varieties of methods exist ...
S. Cikara, Stanislaw P. Maj, David T. Shaw