Sciweavers

837 search results - page 69 / 168
» Hard combinators
Sort
View
IMA
2005
Springer
71views Cryptology» more  IMA 2005»
15 years 5 months ago
Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
Abstract. The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi et al. and Vazirani and Vazirani, who proved independently that O(log...
Andrey Sidorenko, Berry Schoenmakers
MFCS
2005
Springer
15 years 5 months ago
Coloring Sparse Random k-Colorable Graphs in Polynomial Expected Time
Abstract. Feige and Kilian [5] showed that finding reasonable approximative solutions to the coloring problem on graphs is hard. This motivates the quest for algorithms that eithe...
Julia Böttcher
WAC
2005
Springer
137views Communications» more  WAC 2005»
15 years 5 months ago
Towards Self-optimizing Protocol Stack for Autonomic Communication: Initial Experience
Abstract. The Internet is facing ever-increasing complexity in the construction, configuration and management of heterogeneous networks. New communication paradigms are underminin...
Xiaoyuan Gu, Xiaoming Fu, Hannes Tschofenig, Lars ...
PODC
2004
ACM
15 years 5 months ago
On the expected payment of mechanisms for task allocation
We study a representative task allocation problem called shortest paths: Let G be a graph in which the edges are owned by self interested agents. The cost of each edge is privatel...
Artur Czumaj, Amir Ronen
CLEF
2004
Springer
15 years 5 months ago
How to Visually Retrieve Images from the St. Andrews Collection Using GIFT
Abstract. The ImageCLEF task of CLEF has a main goal in the retrieval of images from multi–lingual collections. The 2003 imageCLEF saw no group using the visual information of im...
Henning Müller, Antoine Geissbühler