Sciweavers

204 search results - page 4 / 41
» A Half-Million Strong at Least
Sort
View
CODCRY
2009
Springer
111views Cryptology» more  CODCRY 2009»
13 years 11 months ago
On the Impossibility of Strong Encryption Over
We give two impossibility results regarding strong encryption over an infinite enumerable domain. The first one relates to statistically secure one-time encryption. The second on...
Raphael C.-W. Phan, Serge Vaudenay
INFOCOM
2006
IEEE
13 years 11 months ago
Strong Performance Guarantees for Asynchronous Crossbar Schedulers
– Crossbar-based switches are commonly used to implement routers with throughputs up to about 1 Tb/s. The advent of crossbar scheduling algorithms that provide strong performance...
Jonathan Turner
LICS
2007
IEEE
13 years 11 months ago
Strong Normalization as Safe Interaction
When enriching the λ-calculus with rewriting, union types may be needed to type all strongly normalizing terms. However, with rewriting, the elimination rule (∨ E) of union typ...
Colin Riba
STACS
2009
Springer
13 years 11 months ago
Strong Completeness of Coalgebraic Modal Logics
ABSTRACT. Canonical models are of central importance in modal logic, in particular as they witness strong completeness and hence compactness. While the canonical model construction...
Lutz Schröder, Dirk Pattinson
DISOPT
2007
81views more  DISOPT 2007»
13 years 4 months ago
Strong polynomiality of resource constraint propagation
Constraint-based schedulers have been widely successful to tackle complex, disjunctive and cumulative, scheduling applications by combining tree search and constraint propagation....
Luc Mercier, Pascal Van Hentenryck