Sciweavers

769 search results - page 96 / 154
» Where Is the Proof
Sort
View
TCC
2009
Springer
151views Cryptology» more  TCC 2009»
16 years 4 months ago
Secret Sharing and Non-Shannon Information Inequalities
The known secret-sharing schemes for most access structures are not efficient; even for a one-bit secret the length of the shares in the schemes is 2O(n) , where n is the number of...
Amos Beimel, Ilan Orlov
CHI
2008
ACM
16 years 4 months ago
Paperproof: a paper-digital proof-editing system
Recent approaches for linking paper and digital information or services tend to be based on a one-time publishing of digital information where changes to the printed document beco...
Nadir Weibel, Adriana Ispas, Beat Signer, Moira C....
MOBIHOC
2008
ACM
16 years 3 months ago
Optimal relay assignment for cooperative communications
Recently, cooperative communications, in the form of keeping each node with a single antenna and having a node exploit a relay node's antenna, is shown to be a promising appr...
Yi Shi, Sushant Sharma, Y. Thomas Hou, Sastry Komp...
STACS
2009
Springer
15 years 10 months ago
Hardness and Algorithms for Rainbow Connectivity
An edge-colored graph G is rainbow connected if any two vertices are connected by a path whose edges have distinct colors. The rainbow connectivity of a connected graph G, denoted ...
Sourav Chakraborty, Eldar Fischer, Arie Matsliah, ...
APPROX
2009
Springer
135views Algorithms» more  APPROX 2009»
15 years 10 months ago
Tolerant Linearity Testing and Locally Testable Codes
Abstract. We study tolerant linearity testing under general distributions. Given groups G and H, a distribution µ on G, and oracle access to a function f : G → H, we consider th...
Swastik Kopparty, Shubhangi Saraf