Sciweavers

612 search results - page 45 / 123
» Hardness assumptions in the foundations of theoretical compu...
Sort
View
GI
2004
Springer
15 years 3 months ago
On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios
Abstract: Recently, Distributed Hash Tables evolved to a preferred approach for decentralized data management in widely distributed systems. Due to their crucial characteristics â€...
Tobias Heer, Heiko Niedermayer, Leo Petrak, Simon ...
FOCS
2002
IEEE
15 years 2 months ago
Concurrent Zero Knowledge with Logarithmic Round-Complexity
We show that every language in NP has a (black-box) concurrent zero-knowledge proof system using ËœO(log n) rounds of interaction. The number of rounds in our protocol is optimal,...
Manoj Prabhakaran, Alon Rosen, Amit Sahai
CSR
2010
Springer
15 years 2 months ago
Frameworks for Logically Classifying Polynomial-Time Optimisation Problems
We show that a logical framework, based around a fragment of existential second-order logic formerly proposed by others so as to capture the class of polynomially-bounded P-optimi...
James Gate, Iain A. Stewart
GI
2009
Springer
15 years 2 months ago
Tracking an Extended Object Modeled as an Axis-Aligned Rectangle
: In many tracking applications, the extent of the target object is neglected and it is assumed that the received measurements stem from a point source. However, modern sensors are...
Marcus Baum, Uwe D. Hanebeck
FOCS
1999
IEEE
15 years 2 months ago
Non-Malleable Non-Interactive Zero Knowledge and Adaptive Chosen-Ciphertext Security
We introduce the notion of non-malleable noninteractive zero-knowledge (NIZK) proof systems. We show how to transform any ordinary NIZK proof system into one that has strong non-m...
Amit Sahai