Sciweavers

412 search results - page 5 / 83
» A New Proof of the F5 Algorithm
Sort
View
SIGECOM
2011
ACM
232views ECommerce» more  SIGECOM 2011»
14 years 16 days ago
Near optimal online algorithms and fast approximation algorithms for resource allocation problems
We present algorithms for a class of resource allocation problems both in the online setting with stochastic input and in the offline setting. This class of problems contains man...
Nikhil R. Devanur, Kamal Jain, Balasubramanian Siv...
MPC
2010
Springer
147views Mathematics» more  MPC 2010»
15 years 2 months ago
Designing an Algorithmic Proof of the Two-Squares Theorem
We show a new and constructive proof of the two-squares theorem, based on a somewhat unusual, but very effective, way of rewriting the so-called extended Euclid’s algorithm. Rat...
João F. Ferreira
JMM2
2007
118views more  JMM2 2007»
14 years 9 months ago
Universal Detection of JPEG Steganography
Abstract— In this paper, we present a novel universal approach which consists in exploring statistics in the compressed frequency domain. This approach is motivated by two main c...
Johann Barbier, Eric Filiol, Kichenakoumar Mayoura
COCO
2003
Springer
102views Algorithms» more  COCO 2003»
15 years 3 months ago
Memoization and DPLL: Formula Caching Proof Systems
A fruitful connection between algorithm design and proof complexity is the formalization of the ¤¦¥¨§©§ approach to satisfiability testing in terms of tree-like resolution...
Paul Beame, Russell Impagliazzo, Toniann Pitassi, ...
CRYPTO
2012
Springer
222views Cryptology» more  CRYPTO 2012»
13 years 5 days ago
Secure Identity-Based Encryption in the Quantum Random Oracle Model
We give the first proof of security for an identity-based encryption scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model ...
Mark Zhandry