Sciweavers

95 search results - page 18 / 19
» Extendability of Ternary Linear Codes
Sort
View
STOC
2006
ACM
138views Algorithms» more  STOC 2006»
14 years 6 months ago
The PCP theorem by gap amplification
The PCP theorem [3, 2] says that every language in NP has a witness format that can be checked probabilistically by reading only a constant number of bits from the proof. The cele...
Irit Dinur
BMCBI
2007
168views more  BMCBI 2007»
13 years 6 months ago
Bayesian model-based inference of transcription factor activity
Background: In many approaches to the inference and modeling of regulatory interactions using microarray data, the expression of the gene coding for the transcription factor is co...
Simon Rogers, Raya Khanin, Mark Girolami
SIGMETRICS
2008
ACM
138views Hardware» more  SIGMETRICS 2008»
13 years 6 months ago
Utility maximization in peer-to-peer systems
In this paper, we study the problem of utility maximization in P2P systems, in which aggregate application-specific utilities are maximized by running distributed algorithms on P2...
Minghua Chen, Miroslav Ponec, Sudipta Sengupta, Ji...
ICCV
2011
IEEE
12 years 6 months ago
The Power of Comparative Reasoning
Rank correlation measures are known for their resilience to perturbations in numeric values and are widely used in many evaluation metrics. Such ordinal measures have rarely been ...
Jay Yagnik, Dennis Strelow, David Ross, Ruei-sung ...
EUROCRYPT
2009
Springer
14 years 6 months ago
Smashing SQUASH-0
At the RFID Security Workshop 2007, Adi Shamir presented a new challenge-response protocol well suited for RFIDs, although based on the Rabin public-key cryptosystem. This protocol...
Khaled Ouafi, Serge Vaudenay