Sciweavers

1716 search results - page 304 / 344
» Proving Conditional Termination
Sort
View
EUROCRYPT
2001
Springer
15 years 5 months ago
The Bit Security of Paillier's Encryption Scheme and Its Applications
At EuroCrypt’99, Paillier proposed a new encryption scheme based on higher residuosity classes. The new scheme was proven to be one-way under the assumption that computing N-resi...
Dario Catalano, Rosario Gennaro, Nick Howgrave-Gra...
105
Voted
ICC
2007
IEEE
168views Communications» more  ICC 2007»
15 years 4 months ago
Centralized Radio Resource Allocation for OFDMA Cellular Systems
Efficient resource allocation in cellular OFDMA systems envisages the assignment of the number of subcarriers and the relative transmission format on the basis of the experimented ...
Andrea Abrardo, Alessandro Alessio, Paolo Detti, M...
117
Voted
FOCS
2000
IEEE
15 years 4 months ago
How Bad is Selfish Routing?
We consider the problem of routing traffic to optimize the performance of a congested network. We are given a network, a rate of traffic between each pair of nodes, and a latency ...
Tim Roughgarden, Éva Tardos
131
Voted
UAI
2008
15 years 2 months ago
Dyna-Style Planning with Linear Function Approximation and Prioritized Sweeping
We consider the problem of efficiently learning optimal control policies and value functions over large state spaces in an online setting in which estimates must be available afte...
Richard S. Sutton, Csaba Szepesvári, Alborz...
CORR
2010
Springer
153views Education» more  CORR 2010»
15 years 25 days ago
To Feed or Not to Feed Back
We study the communication over Finite State Channels (FSCs), where the encoder and the decoder can control the availability or the quality of the noise-free feedback. Specificall...
Himanshu Asnani, Haim H. Permuter, Tsachy Weissman