Sciweavers

305 search results - page 38 / 61
» From Sets to Bits in Coq
Sort
View
116
Voted
RT
2004
Springer
15 years 5 months ago
Bixels: Picture Samples with Sharp Embedded Boundaries
Pixels store a digital image as a grid of point samples that can reconstruct a limited-bandwidth continuous 2-D source image. Although convenient for anti-aliased display, these b...
Jack Tumblin, Prasun Choudhury
SIGCOMM
2010
ACM
15 years 20 days ago
Design and implementation of an "approximate" communication system for wireless media applications
All practical wireless communication systems are prone to errors. At the symbol level such wireless errors have a well-defined structure: when a receiver decodes a symbol erroneou...
Sayandeep Sen, Syed Gilani, Shreesha Srinath, Step...
PKC
2010
Springer
148views Cryptology» more  PKC 2010»
15 years 4 months ago
On the Feasibility of Consistent Computations
In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to f...
Sven Laur, Helger Lipmaa
95
Voted
SODA
2008
ACM
144views Algorithms» more  SODA 2008»
15 years 1 months ago
Fast dimension reduction using Rademacher series on dual BCH codes
The Fast Johnson-Lindenstrauss Transform (FJLT) was recently discovered by Ailon and Chazelle as a novel technique for performing fast dimension reduction with small distortion fr...
Nir Ailon, Edo Liberty
115
Voted
SIGOPS
2008
183views more  SIGOPS 2008»
15 years 11 days ago
Plan 9 authentication in Linux
In Linux, applications like su and login currently run as root in order to access authentication information and set or alter the identity of the process. In such cases, if the ap...
Ashwin Ganti