Sciweavers

706 search results - page 61 / 142
» List Decoding: Algorithms and Applications
Sort
View
JSAC
2006
155views more  JSAC 2006»
15 years 1 months ago
Cross-Layer Optimized Video Streaming Over Wireless Multihop Mesh Networks
Abstract--The proliferation of wireless multihop communication infrastructures in office or residential environments depends on their ability to support a variety of emerging appli...
Yiannis Andreopoulos, Nicholas Mastronarde, Mihael...
CAV
2012
Springer
270views Hardware» more  CAV 2012»
13 years 4 months ago
Automated Termination Proofs for Java Programs with Cyclic Data
Abstract. In earlier work, we developed a technique to prove termination of Java programs automatically: first, Java programs are automatically transformed to term rewrite systems...
Marc Brockschmidt, Richard Musiol, Carsten Otto, J...
PKC
2009
Springer
126views Cryptology» more  PKC 2009»
16 years 2 months ago
Verifiable Rotation of Homomorphic Encryptions
Similar to verifiable shuffling (or, mixing), we consider the problem of verifiable rotating (and random re-encrypting) a given list of homomorphic encryptions. The offset by which...
Sebastiaan de Hoogh, Berry Schoenmakers, Boris Sko...
ECCC
1998
118views more  ECCC 1998»
15 years 1 months ago
Chinese Remaindering with Errors
The Chinese Remainder Theorem states that a positive integer m is uniquely speci ed by its remainder modulo k relatively prime integers p1;:::;pk, provided m < Qk i=1 pi. Thus ...
Oded Goldreich, Dana Ron, Madhu Sudan
SODA
2004
ACM
115views Algorithms» more  SODA 2004»
15 years 3 months ago
Minimizing the stabbing number of matchings, trees, and triangulations
The (axis-parallel) stabbing number of a given set of line segments is the maximum number of segments that can be intersected by any one (axis-parallel) line. We investigate probl...
Sándor P. Fekete, Marco E. Lübbecke, H...