Sciweavers

40 search results - page 8 / 8
» Relating Two Standard Notions of Secrecy
Sort
View
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
13 years 6 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
ECCC
2000
140views more  ECCC 2000»
13 years 5 months ago
Randomized Approximation Schemes for Scheduling Unrelated Parallel Machines
We consider the problem of Scheduling n Independent Jobs on m Unrelated Parallel Machines, when the number of machines m is xed. We address the standard problem of minimizing the ...
Pavlos Efraimidis, Paul G. Spirakis
CORR
2011
Springer
185views Education» more  CORR 2011»
13 years 8 days ago
Sound and Complete Query Answering in Intensional P2P Data Integration
Contemporary use of the term ’intension’ derives from the traditional logical doctrine that an idea has both an extension and an intension. In this paper we introduce an intens...
Zoran Majkic
BMCBI
2008
97views more  BMCBI 2008»
13 years 5 months ago
MCM-test: a fuzzy-set-theory-based approach to differential analysis of gene pathways
Background: Gene pathway can be defined as a group of genes that interact with each other to perform some biological processes. Along with the efforts to identify the individual g...
Lily R. Liang, Vinay Mandal, Yi Lu, Deepak Kumar
TIT
2002
126views more  TIT 2002»
13 years 4 months ago
Two-dimensional interleaving schemes with repetitions: Constructions and bounds
Abstract--Two-dimensional interleaving schemes with repetitions are considered. These schemes are required for the correction of two-dimensional bursts (or clusters) of errors in a...
Tuvi Etzion, Alexander Vardy