Sciweavers

1992 search results - page 10 / 399
» On the (limited) power of non-equivocation
Sort
View
MST
2006
81views more  MST 2006»
14 years 9 months ago
Local Limit Properties for Pattern Statistics and Rational Models
Motivated by problems of pattern statistics, we study the limit distribution of the random variable counting the number of occurrences of the symbol a in a word of length n chosen...
Alberto Bertoni, Christian Choffrut, Massimiliano ...
ERSHOV
2006
Springer
15 years 1 months ago
Information-Flow Attacks Based on Limited Observations
Abstract. Two formal models for description of timing attacks are presented, studied and compared with other security concepts. The models are based on a timed process algebra and ...
Damas P. Gruska
IROS
2006
IEEE
112views Robotics» more  IROS 2006»
15 years 3 months ago
Multi-robot Aggregation Strategies with Limited Communication
– The limited power, low radio range, and an ever changing environment make the ability to explicitly communicate between multi-robots decreases in a searching task. When this ha...
Yan Meng, Jeffrey V. Nickerson, Jing Gan
73
Voted
COCO
2004
Springer
95views Algorithms» more  COCO 2004»
15 years 2 months ago
Consequences and Limits of Nonlocal Strategies
This paper investigates the powers and limitations of quantum entanglement in the context of cooperative games of incomplete information. We give several examples of such nonlocal...
Richard Cleve, Peter Høyer, Benjamin Toner,...
ICISC
2008
103views Cryptology» more  ICISC 2008»
14 years 11 months ago
Instruction Set Limitation in Support of Software Diversity
This paper proposes a novel technique, called instruction set limitation, to strengthen the resilience of software diversification against collusion attacks. Such attacks require a...
Bjorn De Sutter, Bertrand Anckaert, Jens Geiregat,...