Sciweavers

27692 search results - page 170 / 5539
» Where is ...
Sort
View
PODS
2004
ACM
109views Database» more  PODS 2004»
14 years 10 months ago
On the Complexity of Optimal K-Anonymity
The technique of k-anonymization has been proposed in the literature as an alternative way to release public information, while ensuring both data privacy and data integrity. We p...
Adam Meyerson, Ryan Williams
ICSE
2005
IEEE-ACM
14 years 10 months ago
Locating causes of program failures
Which is the defect that causes a software failure? By comparing the program states of a failing and a passing run, we can identify the state differences that cause the failure. H...
Holger Cleve, Andreas Zeller
PERCOM
2004
ACM
14 years 10 months ago
Analyzing Connectivity-Based Multi-Hop Ad-hoc Positioning
We investigate the theoretical limits of positioning algorithms. In particular, we study scenarios where the nodes do not receive anchors directly (multi-hop) and where no physica...
Regina Bischoff, Roger Wattenhofer
DCC
2008
IEEE
14 years 10 months ago
Extractors for binary elliptic curves
We propose a simple and efficient deterministic extractor for an ordinary elliptic curve E, defined over F2n , where n = 2 and is a positive integer. Our extractor, for a given poi...
Reza Rezaeian Farashahi, Ruud Pellikaan, Andrey Si...
DCC
2004
IEEE
14 years 10 months ago
Register Synthesis for Algebraic Feedback Shift Registers Based on Non-Primes
In this paper, we describe a solution to the register synthesis problem for a class of sequence generators known as Algebraic Feedback Shift Registers. These registers are based o...
Andrew Klapper, Jinzhong Xu