Sciweavers

53327 search results - page 10536 / 10666
» or 2007
Sort
View
CORR
2007
Springer
127views Education» more  CORR 2007»
13 years 9 months ago
Using decision problems in public key cryptography
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by no...
Vladimir Shpilrain, Gabriel Zapata
CORR
2007
Springer
163views Education» more  CORR 2007»
13 years 9 months ago
Personalizing Image Search Results on Flickr
The social media site Flickr allows users to upload their photos, annotate them with tags, submit them to groups, and also to form social networks by adding other users as contact...
Kristina Lerman, Anon Plangprasopchok, Chio Wong
CORR
2007
Springer
155views Education» more  CORR 2007»
13 years 9 months ago
Low-density graph codes that are optimal for source/channel coding and binning
We describe and analyze the joint source/channel coding properties of a class of sparse graphical codes based on compounding a low-density generator matrix (LDGM) code with a low-...
Martin J. Wainwright, Emin Martinian
CORR
2007
Springer
121views Education» more  CORR 2007»
13 years 9 months ago
Lower Bounds on Implementing Robust and Resilient Mediators
We provide new and tight lower bounds on the ability of players to implement equilibria using cheap talk, that is, just allowing communication among the players. One of our main r...
Ittai Abraham, Danny Dolev, Joseph Y. Halpern
CORR
2007
Springer
89views Education» more  CORR 2007»
13 years 9 months ago
Evaluating Personal Archiving Strategies for Internet-based Information
Internet-based personal digital belongings present different vulnerabilities than locally stored materials. We use responses to a survey of people who have recovered lost websites...
Catherine C. Marshall, Frank McCown, Michael L. Ne...
« Prev « First page 10536 / 10666 Last » Next »