Sciweavers

54 search results - page 3 / 11
» The 'Vanishing' IT Productivity: A Simple Theory
Sort
View
ASIACRYPT
2011
Springer
12 years 6 months ago
Leakage-Resilient Cryptography from the Inner-Product Extractor
We present a generic method to secure various widely-used cryptosystems against arbitrary side-channel leakage, as long as the leakage adheres three restrictions: first, it is bou...
Stefan Dziembowski, Sebastian Faust
CRIWG
2004
13 years 7 months ago
On Theory-Driven Design of Collaboration Technology and Process
The design and deployment of collaboration technology has, until lately been more of an art than a science, but it has produced some solid successes. Commercial groupware products ...
Robert O. Briggs
ACSC
2006
IEEE
14 years 2 days ago
Modelling layer 2 and layer 3 device bandwidths using B-node theory
Modern computer networks contain an amalgamation of devices and technologies, with the performance exhibited by each central to digital communications. Varieties of methods exist ...
S. Cikara, Stanislaw P. Maj, David T. Shaw
SIGECOM
2008
ACM
131views ECommerce» more  SIGECOM 2008»
13 years 5 months ago
Truthful germs are contagious: a local to global characterization of truthfulness
We study the question of how to easily recognize whether a social unction f from an abstract type space to a set of outcomes is truthful, i.e. implementable by a truthful mechanis...
Aaron Archer, Robert Kleinberg
CORR
2008
Springer
178views Education» more  CORR 2008»
13 years 6 months ago
Model-Based Compressive Sensing
Compressive sensing (CS) is an alternative to Shannon/Nyquist sampling for acquisition of sparse or compressible signals that can be well approximated by just K N elements from a...
Richard G. Baraniuk, Volkan Cevher, Marco F. Duart...