Sciweavers

CORR
2011
Springer
143views Education» more  CORR 2011»
13 years 3 months ago
Non-malleable extractors via character sums
In studying how to communicate over a public channel with an active adversary, Dodis and Wichs introduced the notion of a non-malleable extractor. A non-malleable extractor dramat...
Trevor D. Wooley, David Zuckerman
CORR
2011
Springer
144views Education» more  CORR 2011»
13 years 3 months ago
Rank Aggregation via Nuclear Norm Minimization
The process of rank aggregation is intimately intertwined with the structure of skew-symmetric matrices. We apply recent advances in the theory and algorithms of matrix completion...
David F. Gleich, Lek-Heng Lim
CORR
2011
Springer
196views Education» more  CORR 2011»
13 years 3 months ago
Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions
In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedbac...
Michael T. Goodrich, Florian Kerschbaum
CORR
2011
Springer
168views Education» more  CORR 2011»
13 years 3 months ago
Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge
— This paper describes the winning entry to the IJCNN 2011 Social Network Challenge run by Kaggle.com. The goal of the contest was to promote research on realworld link predictio...
Arvind Narayanan, Elaine Shi, Benjamin I. P. Rubin...
CORR
2011
Springer
157views Education» more  CORR 2011»
13 years 3 months ago
Orphan-Free Anisotropic Voronoi Diagrams
We describe conditions under which an appropriately-defined anisotropic Voronoi diagram of a set of sites in Euclidean space is guaranteed to be composed of connected cells in an...
Guillermo D. Cañas, Steven J. Gortler
CORR
2011
Springer
175views Education» more  CORR 2011»
13 years 3 months ago
Cooperative Defense Against Pollution Attacks in Network Coding Using SpaceMac
Abstract—Intra-session network coding is known to be vulnerable to pollution attacks. In this work, first, we introduce a novel homomorphic MAC scheme called SpaceMac, which all...
Anh Le, Athina Markopoulou
CORR
2011
Springer
162views Education» more  CORR 2011»
13 years 3 months ago
Homology and Robustness of Level and Interlevel Sets
Given a function f : X → R on a topological space, we consider the preimages of intervals and their homology groups and show how to read the ranks of these groups from the exten...
Paul Bendich, Herbert Edelsbrunner, Dmitriy Morozo...
CORR
2011
Springer
166views Education» more  CORR 2011»
13 years 3 months ago
A family of fast-decodable MIDO codes from crossed-product algebras over Q
—Multiple Input Double Output (MIDO) asymmetric space-time codes for 4 transmit antennas and 2 receive antennas can be employed in the downlink from base stations to portable dev...
Laura Luzzi, Frédérique E. Oggier
CORR
2011
Springer
100views Education» more  CORR 2011»
13 years 3 months ago
TCP Relentless Congestion Control Model
Rémi Diana, Emmanuel Lochin