Sciweavers

2131 search results - page 15 / 427
» Immunity for Closed Sets
Sort
View
75
Voted
LOGCOM
2007
72views more  LOGCOM 2007»
15 years 17 days ago
Post's Programme for the Ershov Hierarchy
This paper extends Post’s programme to finite levels of the Ershov hierarchy of ∆2 sets. Our initial characterisation, in the spirit of Post [27], of the degrees of the immune...
Bahareh Afshari, George Barmpalias, S. Barry Coope...
98
Voted
DCC
2000
IEEE
15 years 16 days ago
Relating Differential Distribution Tables to Other Properties of of Substitution Boxes
Due to the success of differential and linear attacks on a large number of encryption algorithms, it is importanttoinvestigaterelationshipsamongvariouscryptographic, includingdiffe...
Xian-Mo Zhang, Yuliang Zheng, Hideki Imai
EUROCRYPT
2004
Springer
15 years 6 months ago
Immunizing Encryption Schemes from Decryption Errors
We provide methods for transforming an encryption scheme susceptible to decryption errors into one that is immune to these errors. Immunity to decryption errors is vital when const...
Cynthia Dwork, Moni Naor, Omer Reingold
137
Voted
ICAS
2006
IEEE
207views Robotics» more  ICAS 2006»
15 years 6 months ago
Biologically-Inspired Design of Autonomous and Adaptive Grid Services
Abstract—This paper describes and evaluates a biologically-inspired network architecture that allows grid services to autonomously adapt to dynamic environment changes in the net...
Chonho Lee, Junichi Suzuki
127
Voted
CORR
2010
Springer
117views Education» more  CORR 2010»
15 years 24 days ago
Stability of Reeb graphs under function perturbations: the case of closed curves
ABSTRACT. Reeb graphs provide a method for studying the shape of a manifold by encoding the evolution and arrangement of level sets of a simple Morse function defined on
Barbara Di Fabio, Claudia Landi