Sciweavers

425 search results - page 42 / 85
» Polynomial Time Data Reduction for Dominating Set
Sort
View
FOCS
2006
IEEE
15 years 5 months ago
On the Compressibility of NP Instances and Cryptographic Applications
We study compression that preserves the solution to an instance of a problem rather than preserving the instance itself. Our focus is on the compressibility of NP decision problem...
Danny Harnik, Moni Naor
ICIP
2010
IEEE
14 years 9 months ago
Image analysis with regularized Laplacian eigenmaps
Many classes of image data span a low dimensional nonlinear space embedded in the natural high dimensional image space. We adopt and generalize a recently proposed dimensionality ...
Frank Tompkins, Patrick J. Wolfe
IACR
2011
173views more  IACR 2011»
13 years 11 months ago
All-But-Many Lossy Trapdoor Functions
We put forward a generalization of lossy trapdoor functions (LTFs). Namely, all-but-many lossy trapdoor functions (ABM-LTFs) are LTFs that are parametrized with tags. Each tag can...
Dennis Hofheinz
TON
2008
125views more  TON 2008»
14 years 11 months ago
Two techniques for fast computation of constrained shortest paths
Abstract-- Computing constrained shortest paths is fundamental to some important network functions such as QoS routing, which is to find the cheapest path that satisfies certain co...
Shigang Chen, Meongchul Song, Sartaj Sahni
JSAC
2008
136views more  JSAC 2008»
14 years 11 months ago
Fixed point opportunistic routing in delay tolerant networks
We propose in this work a single copy and multi-hop opportunistic routing scheme for sparse delay tolerant networks (DTNs). The scheme uses as only input the estimates of the avera...
Vania Conan, Jeremie Leguay, Timur Friedman