Sciweavers

5153 search results - page 713 / 1031
» Introduction to Randomized Algorithms
Sort
View
ICIP
2004
IEEE
16 years 6 months ago
Robust perceptual image hashing via matrix invariants
In this paper we suggest viewing images (as well as attacks on them) as a sequence of linear operators and propose novel hashing algorithms employing transforms that are based on ...
Mehmet Kivanç Mihçak, Ramarathnam Ve...
EUROCRYPT
2009
Springer
16 years 5 months ago
Smashing SQUASH-0
At the RFID Security Workshop 2007, Adi Shamir presented a new challenge-response protocol well suited for RFIDs, although based on the Rabin public-key cryptosystem. This protocol...
Khaled Ouafi, Serge Vaudenay
RECOMB
2005
Springer
16 years 4 months ago
Towards an Integrated Protein-Protein Interaction Network
Abstract. Protein-protein interactions play a major role in most cellular processes. Thus, the challenge of identifying the full repertoire of interacting proteins in the cell is o...
Ariel Jaimovich, Gal Elidan, Hanah Margalit, Nir F...
STOC
2001
ACM
104views Algorithms» more  STOC 2001»
16 years 4 months ago
Spatial gossip and resource location protocols
The dynamic behavior of a network in which information is changing continuously over time requires robust and efficient mechanisms for keeping nodes updated about new information. ...
David Kempe, Jon M. Kleinberg, Alan J. Demers
STOC
2001
ACM
163views Algorithms» more  STOC 2001»
16 years 4 months ago
Extractor codes
We study error-correcting codes for highly noisy channels. For example, every received signal in the channel may originate from some half of the symbols in the alphabet. Our main c...
Amnon Ta-Shma, David Zuckerman