Sciweavers

28 search results - page 2 / 6
» That Which Does Not Stabilize, Will Only Make Us Stronger
Sort
View
CORR
2008
Springer
105views Education» more  CORR 2008»
13 years 5 months ago
Success Exponent of Wiretapper: A Tradeoff between Secrecy and Reliability
Equivocation has been widely used as a measure of security after Shannon[10]. For an infinite system such as the wiretap channel defined in [2], equivocation is unbounded and so e...
Chung Chan
SIGMOD
2008
ACM
210views Database» more  SIGMOD 2008»
14 years 6 months ago
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must n...
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, C...
FOCS
2008
IEEE
14 years 8 days ago
Almost-Natural Proofs
Razborov and Rudich have shown that so-called natural proofs are not useful for separating P from NP unless hard pseudorandom number generators do not exist. This famous result is...
Timothy Y. Chow
SODA
2008
ACM
104views Algorithms» more  SODA 2008»
13 years 7 months ago
Fast and reliable reconstruction of phylogenetic trees with very short edges
Abstract Ilan Gronau Shlomo Moran Sagi Snir Phylogenetic reconstruction is the problem of reconstructing an evolutionary tree from sequences corresponding to leaves of that tree. ...
Ilan Gronau, Shlomo Moran, Sagi Snir
PIMRC
2008
IEEE
14 years 6 days ago
Information theory vs. queueing theory for resource allocation in multiple access channels
— We consider the problem of rate allocation in a fading Gaussian multiple-access channel with fixed transmission powers. The goal is to maximize a general concave utility funct...
Ali ParandehGheibi, Muriel Médard, Asuman E...