Sciweavers

406 search results - page 12 / 82
» Pseudorandomness and Combinatorial Constructions
Sort
View
ECCC
1998
105views more  ECCC 1998»
14 years 10 months ago
Pseudorandom generators without the XOR Lemma
Impagliazzo and Wigderson IW97] have recently shown that if there exists a decision problem solvable in time 2O(n) and having circuit complexity 2 (n) (for all but nitely many n) ...
Madhu Sudan, Luca Trevisan, Salil P. Vadhan
PKC
2010
Springer
119views Cryptology» more  PKC 2010»
15 years 1 months ago
Efficient Set Operations in the Presence of Malicious Adversaries
We revisit the problem of constructing efficient secure two-party protocols for the problems of setintersection and set-union, focusing on the model of malicious parties. Our main...
Carmit Hazay, Kobbi Nissim
52
Voted
JCT
2006
52views more  JCT 2006»
14 years 11 months ago
Further combinatorial constructions for optimal frequency-hopping sequences
Frequency-hopping multiple-access (FHMA) spread spectrum communication systems employing multiple frequency shift keying as data modulation technique were investigated by Fuji-Har...
Gennian Ge, Ryoh Fuji-Hara, Ying Miao
DMIN
2009
142views Data Mining» more  DMIN 2009»
14 years 9 months ago
A Combinatorial Fusion Method for Feature Construction
- This paper demonstrates how methods borrowed from information fusion can improve the performance of a classifier by constructing (i.e., fusing) new features that are combinations...
Ye Tian, Gary M. Weiss, D. Frank Hsu, Qiang Ma
ECCC
2007
88views more  ECCC 2007»
14 years 11 months ago
Combinatorial Construction of Locally Testable Codes
An error correcting code is said to be locally testable if there is a test that checks whether a given string is a codeword, or rather far from the code, by reading only a constan...
Or Meir