Sciweavers

1054 search results - page 114 / 211
» Determining Computing Science's Role
Sort
View
117
Voted
FOCS
2009
IEEE
15 years 10 months ago
Bit Encryption Is Complete
Abstract— Under CPA and CCA1 attacks, a secure bit encryption scheme can be applied bit-by-bit to construct a secure many-bit encryption scheme. The same construction fails, howe...
Steven Myers, Abhi Shelat
105
Voted
MFCS
2009
Springer
15 years 10 months ago
Balanced Paths in Colored Graphs
We consider finite graphs whose edges are labeled with elements, called colors, taken from a fixed finite alphabet. We study the problem of determining whether there is an infi...
Alessandro Bianco, Marco Faella, Fabio Mogavero, A...
135
Voted
ACMSE
2009
ACM
15 years 10 months ago
A case for compiler-driven superpage allocation
Most modern microprocessor-based systems provide support for superpages both at the hardware and software level. Judicious use of superpages can significantly cut down the number...
Joshua Magee, Apan Qasem
132
Voted
ENC
2008
IEEE
15 years 10 months ago
Context-Aware Generation of User Interface Containers for Mobile Devices
—The world of the mobile devices involves restrictive features. Multiple efforts have been done to define the User Interface. Here, it is combined a neutral description of the UI...
Francisco J. Martínez-Ruiz, Jean Vanderdonc...
105
Voted
FOCS
2008
IEEE
15 years 10 months ago
Two Query PCP with Sub-Constant Error
We show that the NP-Complete language 3SAT has a PCP verifier that makes two queries to a proof of almost-linear size and achieves sub-constant probability of error o(1). The ver...
Dana Moshkovitz, Ran Raz