Sciweavers

58 search results - page 5 / 12
» How to Round Any CSP
Sort
View
WWW
2010
ACM
15 years 3 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
STOC
1998
ACM
121views Algorithms» more  STOC 1998»
15 years 2 months ago
Non-Interactive and Non-Malleable Commitment
A commitment protocol is a fundamental cryptographic primitive used as a basic buildingblock throughoutmodern cryptography. In STOC 1991, Dolev Dwork and Naor showed that in many ...
Giovanni Di Crescenzo, Yuval Ishai, Rafail Ostrovs...
CP
2007
Springer
15 years 4 months ago
GAC Via Unit Propagation
In this paper we argue that an attractive and potentially very general way of achieving generalized arc consistency (GAC) on a constraint is by using unit propagation (UP) over a C...
Fahiem Bacchus
ICDCS
2002
IEEE
15 years 2 months ago
From Total Order to Database Replication
This paper presents in detail an efficient and provably correct algorithm for database replication over partitionable networks. Our algorithm avoids the need for end-toend acknow...
Yair Amir, Ciprian Tutu
PODC
2010
ACM
15 years 1 months ago
Brief announcement: exponential speed-up of local algorithms using non-local communication
We demonstrate how to leverage a system’s capability for allto-all communication to achieve an exponential speed-up of local algorithms despite bandwidth and memory restrictions...
Christoph Lenzen, Roger Wattenhofer