Sciweavers

475 search results - page 79 / 95
» Z3-Connectivity with Independent Number 2
Sort
View
FOCM
2011
188views more  FOCM 2011»
13 years 2 months ago
Compressive Wave Computation
This paper considers large-scale simulations of wave propagation phenomena. We argue that it is possible to accurately compute a wavefield by decomposing it onto a largely incomp...
Laurent Demanet, Gabriel Peyré
INFOCOM
2011
IEEE
13 years 2 months ago
Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs
—We address pairwise and (for the first time) triple key establishment problems in wireless sensor networks (WSN). We use combinatorial designs to establish pairwise keys betwee...
Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic
MCS
2011
Springer
13 years 1 months ago
Investigating other leading indicators influencing Australian domestic tourism demand
: In the tourism demand literature, much of the research focuses on income and price variables as demand determinants for travel. Nevertheless, the literature has neglected other p...
Ghialy Yap, David Allen
APPROX
2011
Springer
242views Algorithms» more  APPROX 2011»
12 years 11 months ago
New Tools for Graph Coloring
How to color 3 colorable graphs with few colors is a problem of longstanding interest. The best polynomial-time algorithm uses n0.2072 colors. There are no indications that colori...
Sanjeev Arora, Rong Ge
IACR
2011
196views more  IACR 2011»
12 years 10 months ago
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Gilad Asharov, Abhishek Jain, Daniel Wichs