Sciweavers

317 search results - page 32 / 64
» Who gives a tweet
Sort
View
IMA
2005
Springer
71views Cryptology» more  IMA 2005»
14 years 2 months ago
Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
Abstract. The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi et al. and Vazirani and Vazirani, who proved independently that O(log...
Andrey Sidorenko, Berry Schoenmakers
TCC
2005
Springer
102views Cryptology» more  TCC 2005»
14 years 2 months ago
Toward Privacy in Public Databases
Abstract. We initiate a theoretical study of the census problem. Informally, in a census individual respondents give private information to a trusted party (the census bureau), who...
Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam...
ACMACE
2004
ACM
14 years 2 months ago
Extending game participation with embodied reporting agents
We introduce a multi-agent framework to generate reports of players' activities within multi-player computer games so that other players who are currently unable to participa...
Dan Fielding, Mike Fraser, Brian Logan, Steve Benf...
ATAL
2004
Springer
14 years 2 months ago
Agent-Based Peer-to-Peer Service Networks: A Study of Effectiveness and Structure Evolution
We study peer-to-peer service networks consisting of autonomous agents who seek and provide services. To fulfill its local needs, an agent attempts to discover and select informa...
Yathiraj B. Udupi, Pinar Yolum, Munindar P. Singh
CSL
2004
Springer
14 years 2 months ago
Moving in a Crumbling Network: The Balanced Case
In this paper we continue the study of ‘sabotage modal logic’ SML which was suggested by van Benthem. In this logic one describes the progression along edges of a transition gr...
Philipp Rohde