Sciweavers

893 search results - page 60 / 179
» Descent Theory for Schemes
Sort
View
INFOCOM
2008
IEEE
15 years 6 months ago
Cross-Monotonic Multicast
—In the routing and cost sharing of multicast towards a group of potential receivers, cross-monotonicity is a property that states a user’s payment can only be smaller when ser...
Zongpeng Li
CHES
2005
Springer
82views Cryptology» more  CHES 2005»
15 years 5 months ago
Masking at Gate Level in the Presence of Glitches
Abstract. It has recently been shown that logic circuits in the implementation of cryptographic algorithms, although protected by “secure” random masking schemes, leak side-cha...
Wieland Fischer, Berndt M. Gammel
DCC
1996
IEEE
15 years 4 months ago
Lapped Orthogonal Vector Quantization
The block processing inherent in the use of traditional vector quantization (VQ) schemes typically gives rise to perceptually distracting blocking artifacts. We demonstrate that s...
Henrique S. Malvar, Gary J. Sullivan, Gregory W. W...
ATAL
2010
Springer
15 years 1 months ago
Point-based backup for decentralized POMDPs: complexity and new algorithms
Decentralized POMDPs provide an expressive framework for sequential multi-agent decision making. Despite their high complexity, there has been significant progress in scaling up e...
Akshat Kumar, Shlomo Zilberstein
CCS
2010
ACM
15 years 2 days ago
Secure latency estimation with treeple
A network latency estimation scheme associates a "position" to every peer in a distributed network such that the latency between any two nodes can be accurately estimate...
Eric Chan-Tin, Nicholas Hopper