Sciweavers

876 search results - page 60 / 176
» Limits on the Usefulness of Random Oracles
Sort
View
93
Voted
IWOCA
2009
Springer
149views Algorithms» more  IWOCA 2009»
15 years 7 months ago
Randomized Postoptimization of Covering Arrays
The construction of covering arrays with the fewest rows remains a challenging problem. Most computational and recursive constructions result in extensive repetition of coverage. W...
Peyman Nayeri, Charles J. Colbourn, Goran Konjevod
98
Voted
INFOCOM
2007
IEEE
15 years 7 months ago
Toward Optimal Data Aggregation in Random Wireless Sensor Networks
Abstract— Data gathering is one of the most important services provided by wireless sensor networks (WSNs). Since the predominant traffic pattern in data gathering services is m...
Rong Zheng, Richard J. Barton
VLDB
1992
ACM
137views Database» more  VLDB 1992»
15 years 4 months ago
Random Sampling from Pseudo-Ranked B+ Trees
In the past, two basic approaches for sampling f5-om B+ trees have been suggested: sampling from the ranked trees and acceptance/rejection sampling i?om non-ranked trees. The firs...
Gennady Antoshenkov
SIAMREV
2010
114views more  SIAMREV 2010»
14 years 7 months ago
From Random Polygon to Ellipse: An Eigenanalysis
Suppose x and y are unit 2-norm n-vectors whose components sum to zero. Let P(x, y) be the polygon obtained by connecting (x1, y1), . . . , (xn, yn), (x1, y1) in order. We say that...
Adam N. Elmachtoub, Charles F. Van Loan
EUROCRYPT
2005
Springer
15 years 6 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...