Sciweavers

461 search results - page 78 / 93
» Bounds for Validation
Sort
View
CRYPTO
2011
Springer
180views Cryptology» more  CRYPTO 2011»
13 years 9 months ago
Leakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
Sanjam Garg, Abhishek Jain 0002, Amit Sahai
ICDE
2012
IEEE
228views Database» more  ICDE 2012»
13 years 5 days ago
A General Method for Estimating Correlated Aggregates over a Data Stream
—On a stream of two dimensional data items (x, y) where x is an item identifier, and y is a numerical attribute, a correlated aggregate query requires us to first apply a selec...
Srikanta Tirthapura, David P. Woodruff
JSAC
2007
132views more  JSAC 2007»
14 years 9 months ago
Capacity analysis of MediaGrid: a P2P IPTV platform for fiber to the node (FTTN) networks
— This paper studies the conditions under which P2P sharing can increase the capacity of IPTV services over FTTN networks. For a typical FTTN network, our study shows a) P2P shar...
Yennun Huang, Yih-Farn Chen, Rittwik Jana, Hongbo ...
SMA
2009
ACM
223views Solid Modeling» more  SMA 2009»
15 years 4 months ago
Particle-based forecast mechanism for continuous collision detection in deformable environments
Collision detection in geometrically complex scenes is crucial in physical simulations and real time applications. Works based on spatial hierarchical structures have been propose...
Thomas Jund, David Cazier, Jean-François Du...
SAC
2004
ACM
15 years 3 months ago
Dynamic on-demand updating of data in real-time database systems
The amount of data handled by real-time and embedded applications is increasing. Also, applications normally have constraints with respect to freshness and timeliness of the data ...
Thomas Gustafsson, Jörgen Hansson