Sciweavers

1763 search results - page 203 / 353
» A Formalization of Polytime Functions
Sort
View
ICDM
2002
IEEE
111views Data Mining» more  ICDM 2002»
15 years 6 months ago
An Algebraic Approach to Data Mining: Some Examples
In this paper, we introduce an algebraic approach to the foundations of data mining. Our approach is based upon two algebras of functions de ned over a common state space X and a ...
Robert L. Grossman, Richard G. Larson
120
Voted
CDC
2009
IEEE
161views Control Systems» more  CDC 2009»
15 years 6 months ago
Consensus on homogeneous manifolds
Abstract— The present paper considers distributed consensus algorithms for agents evolving on a connected compact homogeneous (CCH) manifold. The agents track no external referen...
Alain Sarlette, Rodolphe Sepulchre
100
Voted
CRYPTO
2001
Springer
155views Cryptology» more  CRYPTO 2001»
15 years 6 months ago
RSA-OAEP Is Secure under the RSA Assumption
Recently Victor Shoup noted that there is a gap in the widely-believed security result of OAEP against adaptive chosen-ciphertext attacks. Moreover, he showed that, presumably, OA...
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointch...
EUROCRYPT
2001
Springer
15 years 6 months ago
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Abstract. We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys som...
Ran Canetti, Hugo Krawczyk
LCTRTS
2001
Springer
15 years 6 months ago
Embedded Control Systems Development with Giotto
Giotto is a principled, tool-supported design methodology for implementing embedded control systems on platforms of possibly distributed sensors, actuators, CPUs, and networks. Gio...
Thomas A. Henzinger, Benjamin Horowitz, Christoph ...