Sciweavers

317 search results - page 20 / 64
» Who gives a tweet
Sort
View
OCLC
2007
86views more  OCLC 2007»
13 years 8 months ago
Utrecht University Repository: the evolution of the Igitur archive - a case-study
Purpose – The purpose of this paper is to outline the development of the institutional repository of Utrecht University, the Igitur Archive. The Utrecht repository is unique for...
Saskia Franken, Bas Savenije, Jennifer Smith
EUROCRYPT
1999
Springer
14 years 1 months ago
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
We consider the problem of basing Oblivious Transfer (OT) and Bit Commitment (BC), with information theoretic security, on seemingly weaker primitives. We introduce a general model...
Ivan Damgård, Joe Kilian, Louis Salvail
STOC
2009
ACM
161views Algorithms» more  STOC 2009»
14 years 9 months ago
List decoding tensor products and interleaved codes
We design the first efficient algorithms and prove new combinatorial bounds for list decoding tensor products of codes and interleaved codes. ? We show that for every code, the rat...
Parikshit Gopalan, Venkatesan Guruswami, Prasad Ra...
FOCS
2009
IEEE
14 years 3 months ago
Dynamic and Non-uniform Pricing Strategies for Revenue Maximization
We consider the Item Pricing problem for revenue maximization in the limited supply setting, where a single seller with n items caters to m buyers with unknown subadditive valuati...
Tanmoy Chakraborty, Zhiyi Huang, Sanjeev Khanna
TCS
2010
13 years 3 months ago
Maximizing the minimum load for selfish agents
We consider the problem of maximizing the minimum load for machines that are controlled by selfish agents, who are only interested in maximizing their own profit. Unlike the class...
Leah Epstein, Rob van Stee