Sciweavers

769 search results - page 25 / 154
» Where Is the Proof
Sort
View
ORL
2008
55views more  ORL 2008»
15 years 4 months ago
Policies utilizing tactical inventory for service-differentiated customers
We consider a manufacturer serving two customer classes where one wants the item immediately and the second receives a discount to accept a delay. We show that a (S, R, B) base st...
Serhan Duran, Tieming Liu, David Simchi-Levi, Juli...
CRYPTO
2007
Springer
116views Cryptology» more  CRYPTO 2007»
15 years 10 months ago
Random Oracles and Auxiliary Input
We introduce a variant of the random oracle model where oracle-dependent auxiliary input is allowed. In this setting, the adversary gets an auxiliary input that can contain informa...
Dominique Unruh
SIAMCOMP
1998
125views more  SIAMCOMP 1998»
15 years 3 months ago
Free Bits, PCPs, and Nonapproximability-Towards Tight Results
This paper continues the investigation of the connection between probabilistically checkable proofs (PCPs) and the approximability of NP-optimization problems. The emphasis is on p...
Mihir Bellare, Oded Goldreich, Madhu Sudan
CRYPTO
2011
Springer
180views Cryptology» more  CRYPTO 2011»
14 years 3 months ago
Leakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
Sanjam Garg, Abhishek Jain 0002, Amit Sahai
SAC
2006
ACM
15 years 10 months ago
Provably faithful evaluation of polynomials
We provide sufficient conditions that formally guarantee that the floating-point computation of a polynomial evaluation is faithful. To this end, we develop a formalization of ...
Sylvie Boldo, César Muñoz