Sciweavers

193 search results - page 20 / 39
» Members of Random Closed Sets
Sort
View
124
Voted
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
13 years 8 months ago
On the Instantiability of Hash-and-Sign RSA Signatures
The hash-and-sign RSA signature is one of the most elegant and well known signatures schemes, extensively used in a wide variety of cryptographic applications. Unfortunately, the o...
Yevgeniy Dodis, Iftach Haitner, Aris Tentes
ECCC
2011
282views ECommerce» more  ECCC 2011»
14 years 7 months ago
Almost k-wise vs. k-wise independent permutations, and uniformity for general group actions
A family of permutations in Sn is k-wise independent if a uniform permutation chosen from the family maps any distinct k elements to any distinct k elements equally likely. Effici...
Noga Alon, Shachar Lovett
GECCO
2003
Springer
134views Optimization» more  GECCO 2003»
15 years 6 months ago
A Fixed-Length Subset Genetic Algorithm for the p-Median Problem
Abstract. In this paper, we review some classical recombination operations and devise new heuristic recombinations for the fixed-length subset. Our experimental results on the cla...
Andrew Lim, Zhou Xu
98
Voted
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 24 days ago
Mixing Time and Stationary Expected Social Welfare of Logit Dynamics
We study logit dynamics [3] for strategic games. At every stage of the game a player is selected uniformly at random and she is assumed to play according to a noisy best-response ...
Vincenzo Auletta, Diodato Ferraioli, Francesco Pas...
110
Voted
CHI
2009
ACM
16 years 1 months ago
Sharing digital photographs in the home by tagging memorabilia
Abstract Within the home, digital photos lack the physical affordances that make collocated photo-sharing easy and opportunistic. Family members have difficulty accessing the perso...
Saul Greenberg, Michael Nunes