Sciweavers

172 search results - page 18 / 35
» Key agreement from weak bit agreement
Sort
View
JCP
2007
143views more  JCP 2007»
14 years 9 months ago
Alternatives for In-Service BER Estimation in All-Optical Networks: Towards Minimum Intrusion
— Combining the existing approaches for optical intelligence and the speed and capacity of light is undoubtedly the only viable strategy for building future-proof, highspeed netw...
Carolina Pinart
CORR
2011
Springer
143views Education» more  CORR 2011»
14 years 1 months ago
Non-malleable extractors via character sums
In studying how to communicate over a public channel with an active adversary, Dodis and Wichs introduced the notion of a non-malleable extractor. A non-malleable extractor dramat...
Trevor D. Wooley, David Zuckerman
79
Voted
CRYPTO
2000
Springer
151views Cryptology» more  CRYPTO 2000»
15 years 1 months ago
New Public-Key Cryptosystem Using Braid Groups
Abstract. The braid groups are infinite non-commutative groups naturally arising from geometric braids. The aim of this article is twofold. One is to show that the braid groups ca...
Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo...
KBSE
2008
IEEE
15 years 4 months ago
Exploring the composition of unit test suites
In agile software development, test code can considerably contribute to the overall source code size. Being a valuable asset both in terms of verification and documentation, the ...
Bart Van Rompaey, Serge Demeyer
RECOMB
2006
Springer
15 years 10 months ago
Identification and Evaluation of Functional Modules in Gene Co-expression Networks
Abstract. Identifying gene functional modules is an important step towards elucidating gene functions at a global scale. In this paper, we introduce a simple method to construct ge...
Jianhua Ruan, Weixiong Zhang