Sciweavers

20 search results - page 4 / 4
» Weak Adversaries for the k-Server Problem
Sort
View
STOC
2003
ACM
95views Algorithms» more  STOC 2003»
14 years 6 months ago
Random knapsack in expected polynomial time
In this paper, we present the first average-case analysis proving an expected polynomial running time for an exact algorithm for the 0/1 knapsack problem. In particular, we prove,...
René Beier, Berthold Vöcking
STOC
2002
ACM
112views Algorithms» more  STOC 2002»
14 years 6 months ago
Wait-free consensus with infinite arrivals
A randomized algorithm is given that solves the wait-free consensus problem for a shared-memory model with infinitely many processes. The algorithm is based on a weak shared coin ...
James Aspnes, Gauri Shah, Jatin Shah
ATAL
2009
Springer
14 years 10 days ago
A demonstration of the Polaris poker system
Poker games provide a useful testbed for modern Artificial Intelligence techniques. Unlike many classical game domains such as chess and checkers, poker includes elements of impe...
Michael H. Bowling, Nicholas Abou Risk, Nolan Bard...
STOC
2010
ACM
193views Algorithms» more  STOC 2010»
13 years 9 months ago
Privacy Amplification with Asymptotically Optimal Entropy Loss
We study the problem of "privacy amplification": key agreement between two parties who both know a weak secret w, such as a password. (Such a setting is ubiquitous on th...
Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostr...
EUROCRYPT
2004
Springer
13 years 11 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer