Sciweavers

893 search results - page 89 / 179
» Descent Theory for Schemes
Sort
View
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
14 years 10 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
ASIACRYPT
2011
Springer
13 years 12 months ago
Leakage-Resilient Cryptography from the Inner-Product Extractor
We present a generic method to secure various widely-used cryptosystems against arbitrary side-channel leakage, as long as the leakage adheres three restrictions: first, it is bou...
Stefan Dziembowski, Sebastian Faust
MOBIHOC
2005
ACM
15 years 11 months ago
Localization and routing in sensor networks by local angle information
Location information is very useful in the design of sensor network infrastructures. In this paper, we study the anchor-free 2D localization problem by using local angle measureme...
Jehoshua Bruck, Jie Gao, Anxiao Jiang
ICCS
2003
Springer
15 years 5 months ago
Anisotropic Convection Model for the Earth's Mantle
The paper presents a theory for modeling flow in anisotropic, viscous rock. This theory has originally been developed for the simulation of large deformation processes including t...
Hans-B. Mühlhaus, M. Cada, Louis Moresi
MST
2006
149views more  MST 2006»
14 years 12 months ago
Parameterized Intractability of Distinguishing Substring Selection
A central question in computational biology is the design of genetic markers to distinguish between two given sets of (DNA) sequences. This question is formalized as the NP-comple...
Jens Gramm, Jiong Guo, Rolf Niedermeier