Sciweavers

4908 search results - page 955 / 982
» On the Complexity of Optimal K-Anonymity
Sort
View
95
Voted
GLOBECOM
2007
IEEE
15 years 1 months ago
The Quality-Energy Scalable OFDMA Modulation for Low Power Transmitter and VLIW Processor Based Implementation
: The improvement of spectral efficiency comes at the cost of exponential increment of signal processing complexity [1]. Hence, the energy-efficiency of baseband has recently turne...
Min Li, Bruno Bougard, Eduardo Lopez-Estraviz, And...
EUROCRYPT
2008
Springer
15 years 1 months ago
Isolated Proofs of Knowledge and Isolated Zero Knowledge
We introduce a new notion called -isolated proofs of knowledge ( -IPoK). These are proofs of knowledge where a cheating prover is allowed to exchange up to bits of communication wi...
Ivan Damgård, Jesper Buus Nielsen, Daniel Wi...
CIDR
2007
141views Algorithms» more  CIDR 2007»
15 years 1 months ago
Fragmentation in Large Object Repositories
Fragmentation leads to unpredictable and degraded application performance. While these problems have been studied in detail for desktop filesystem workloads, this study examines n...
Russell Sears, Catharine van Ingen
DAIS
2007
15 years 1 months ago
Construction and Execution of Adaptable Applications Using an Aspect-Oriented and Model Driven Approach
Constructing and executing distributed applications that can adapt to their current operating context, in order to maintain or enhance Quality of Service (QoS) attribute levels, ar...
Sten A. Lundesgaard, Arnor Solberg, Jon Oldevik, R...
SIROCCO
2010
15 years 1 months ago
Traffic Grooming in Star Networks via Matching Techniques
The problem of grooming is central in studies of optical networks. In graph-theoretic terms, it can be viewed as assigning colors to given paths in a graph, so that at most g (the ...
Ignasi Sau, Mordechai Shalom, Shmuel Zaks