Sciweavers

40 search results - page 7 / 8
» Bounds for separating hash families
Sort
View
SIAMDM
1998
86views more  SIAMDM 1998»
14 years 9 months ago
Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes
In this paper, we investigate combinatorialproperties and constructions of two recent topics of cryptographic interest, namely frameproof codes for digital ngerprinting, and trace...
Douglas R. Stinson, Ruizhong Wei
CORR
2007
Springer
164views Education» more  CORR 2007»
14 years 9 months ago
Capacity Region of the Finite-State Multiple Access Channel with and without Feedback
—The capacity region of the finite-state multiple-access channel (FS-MAC) with feedback that may be an arbitrary timeinvariant function of the channel output samples is consider...
Haim H. Permuter, Tsachy Weissman
STACS
2010
Springer
15 years 4 months ago
Weakening Assumptions for Deterministic Subexponential Time Non-Singular Matrix Completion
Kabanets and Impagliazzo [KI04] show how to decide the circuit polynomial identity testing problem (CPIT) in deterministic subexponential time, assuming hardness of some explicit ...
Maurice Jansen
BMCBI
2008
132views more  BMCBI 2008»
14 years 9 months ago
SCOWLP classification: Structural comparison and analysis of protein binding regions
Background: Detailed information about protein interactions is critical for our understanding of the principles governing protein recognition mechanisms. The structures of many pr...
Joan Teyra, Maciej Paszkowski-Rogacz, Gerd Anders,...
HPDC
2002
IEEE
15 years 2 months ago
Decoupling Computation and Data Scheduling in Distributed Data-Intensive Applications
In high energy physics, bioinformatics, and other disciplines, we encounter applications involving numerous, loosely coupled jobs that both access and generate large data sets. So...
Kavitha Ranganathan, Ian T. Foster