Sciweavers

2168 search results - page 128 / 434
» Randomized Algorithms and Complexity Theory
Sort
View
PICS
2000
15 years 4 months ago
Data Embedding Using Phase Dispersion
A method of data embedding based on the convolution of message data with a random phase carrier is presented. The theory behind this method is reviewed and it is shown that the te...
Chris Honsinger
76
Voted
RSA
1998
53views more  RSA 1998»
15 years 3 months ago
Recursive reconstruction on periodic trees
A periodic tree Tn consists of full n-level copies of a finite tree T. The tree Tn is labeled by random bits. The root label is chosen randomly, and the probability of two adjace...
Elchanan Mossel
COR
2008
122views more  COR 2008»
15 years 3 months ago
First steps to the runtime complexity analysis of ant colony optimization
: The paper presents results on the runtime complexity of two ant colony optimization (ACO) algorithms: Ant System, the oldest ACO variant, and GBAS, the first ACO variant for whic...
Walter J. Gutjahr
AI
2010
Springer
15 years 3 months ago
Optimal query complexity bounds for finding graphs
We consider the problem of finding an unknown graph by using two types of queries with an additive property. Given a graph, an additive query asks the number of edges in a set of ...
Sung-Soon Choi, Jeong Han Kim
144
Voted
CHES
2005
Springer
149views Cryptology» more  CHES 2005»
15 years 8 months ago
Resistance of Randomized Projective Coordinates Against Power Analysis
Embedded devices implementing cryptographic services are the result of a trade-off between cost, performance and security. Aside from flaws in the protocols and the algorithms us...
William Dupuy, Sébastien Kunz-Jacques