Sciweavers

932 search results - page 97 / 187
» Where in the Wikipedia Is That Answer
Sort
View
CRYPTO
2007
Springer
145views Cryptology» more  CRYPTO 2007»
14 years 3 months ago
Chernoff-Type Direct Product Theorems
Consider a challenge-response protocol where the probability of a correct response is at least α for a legitimate user and at most β < α for an attacker. One example is a CAP...
Russell Impagliazzo, Ragesh Jaiswal, Valentine Kab...
CRYPTO
2005
Springer
127views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption
Secret-key agreement between two parties Alice and Bob, connected by an insecure channel, can be realized in an informationtheoretic sense if the parties share many independent pai...
Thomas Holenstein, Renato Renner
ICALP
2005
Springer
14 years 2 months ago
Improved Lower Bounds for Locally Decodable Codes and Private Information Retrieval
We prove new lower bounds for locally decodable codes and private information retrieval. We show that a 2-query LDC encoding nbit strings over an ℓ-bit alphabet, where the decode...
Stephanie Wehner, Ronald de Wolf
OTM
2005
Springer
14 years 2 months ago
Optimization of Distributed Queries in Grid Via Caching
Abstract. Caching can highly improve performance of query processing in distributed databases. In this paper we show how this technique can be used in grid architecture where data ...
Piotr Cybula, Hanna Kozankiewicz, Krzysztof Stence...
DAWAK
2004
Springer
14 years 2 months ago
Categorical Data Visualization and Clustering Using Subjective Factors
Clustering is an important data mining problem. However, most earlier work on clustering focused on numeric attributes which have a natural ordering to their attribute values. Rec...
Chia-Hui Chang, Zhi-Kai Ding