Sciweavers

973 search results - page 49 / 195
» New Bounds on Crossing Numbers
Sort
View
CPM
2008
Springer
148views Combinatorics» more  CPM 2008»
15 years 1 months ago
On-Line Approximate String Matching with Bounded Errors
We introduce a new dimension to the widely studied on-line approximate string matching problem, by introducing an error threshold parameter so that the algorithm is allowed to mis...
Marcos A. Kiwi, Gonzalo Navarro, Claudio Telha
RV
2009
Springer
94views Hardware» more  RV 2009»
15 years 6 months ago
Monitor Circuits for LTL with Bounded and Unbounded Future
Synthesizing monitor circuits for LTL formulas is expensive, because the number of flip-flops in the circuit is exponential in the length of the formula. As a result, the IEEE st...
Bernd Finkbeiner, Lars Kuhtz
FOCS
2005
IEEE
15 years 5 months ago
Cryptography In the Bounded Quantum-Storage Model
We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary’s quantum memory is of bounded size. We show that oblivious ...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
COCO
1997
Springer
144views Algorithms» more  COCO 1997»
15 years 4 months ago
Polynomial Vicinity Circuits and Nonlinear Lower Bounds
We study families of Boolean circuits with the property that the number of gates at distance t fanning into or out of any given gate in a circuit is bounded above by a polynomial ...
Kenneth W. Regan
SIAMCOMP
2008
154views more  SIAMCOMP 2008»
14 years 10 months ago
Cryptography in the Bounded-Quantum-Storage Model
We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivio...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...