Sciweavers

1898 search results - page 372 / 380
» Weak Keys for IDEA
Sort
View
CORR
2010
Springer
208views Education» more  CORR 2010»
13 years 5 months ago
Real-time Robust Principal Components' Pursuit
In the recent work of Candes et al, the problem of recovering low rank matrix corrupted by i.i.d. sparse outliers is studied and a very elegant solution, principal component pursui...
Chenlu Qiu, Namrata Vaswani
CORR
2011
Springer
192views Education» more  CORR 2011»
13 years 3 months ago
Improved Approximation Guarantees for Lower-Bounded Facility Location
d Abstract) Sara Ahmadian∗ Chaitanya Swamy∗ We consider the lower-bounded facility location (LBFL) problem (also sometimes called load-balanced facility location), which is a ...
Sara Ahmadian, Chaitanya Swamy
CORR
2010
Springer
168views Education» more  CORR 2010»
13 years 3 months ago
In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
The basic idea behind cloud computing is that resource providers offer elastic resources to end users. In this paper, we intend to answer one key question to the success of cloud c...
Lei Wang, Jianfeng Zhan, Weisong Shi, Yi Liang
JOC
2011
157views more  JOC 2011»
13 years 3 months ago
Universally Composable Symbolic Security Analysis
In light of the growing complexity of cryptographic protocols and applications, it becomes highly desirable to mechanize — and eventually automate — the security analysis of p...
Ran Canetti, Jonathan Herzog
MAM
2011
349views Communications» more  MAM 2011»
13 years 3 months ago
An iterative logarithmic multiplier
The paper presents a new multiplier enabling achievement of an arbitrary accuracy. It follows the same idea of number representation as the Mitchell’s algorithm, but does not use...
Zdenka Babic, Aleksej Avramovic, Patricio Bulic