Sciweavers

849 search results - page 85 / 170
» Completely Non-malleable Schemes
Sort
View
COORDINATION
2008
Springer
15 years 2 months ago
Encrypted Shared Data Spaces
Abstract. The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content. Existing approach...
Giovanni Russello, Changyu Dong, Naranker Dulay, M...
108
Voted
FOCS
2009
IEEE
15 years 7 months ago
Reducibility among Fractional Stability Problems
— In a landmark paper [32], Papadimitriou introduced a number of syntactic subclasses of TFNP based on proof styles that (unlike TFNP) admit complete problems. A recent series of...
Shiva Kintali, Laura J. Poplawski, Rajmohan Rajara...
WINE
2005
Springer
107views Economy» more  WINE 2005»
15 years 6 months ago
Price of Anarchy of Network Routing Games with Incomplete Information
We consider a class of networks where n agents need to send their traffic from a given source to a given destination over m identical, non-intersecting, and parallel links. For suc...
Dinesh Garg, Yadati Narahari
108
Voted
ICIP
2004
IEEE
16 years 2 months ago
Fast in-band motion estimation with variable size block matching
In this paper we propose a fast motion estimation technique that works in the wavelet domain. The computational cost of the algorithm turns out to be proportional to the linear si...
Davide Maestroni, Augusto Sarti, Marco Tagliasacch...
ICDE
2006
IEEE
222views Database» more  ICDE 2006»
16 years 2 months ago
CLAN: An Algorithm for Mining Closed Cliques from Large Dense Graph Databases
Most previously proposed frequent graph mining algorithms are intended to find the complete set of all frequent, closed subgraphs. However, in many cases only a subset of the freq...
Jianyong Wang, Zhiping Zeng, Lizhu Zhou