Sciweavers

194 search results - page 23 / 39
» Randomness for Free
Sort
View
CORR
2010
Springer
108views Education» more  CORR 2010»
14 years 4 months ago
Finding Cycles and Trees in Sublinear Time
We present sublinear-time (randomized) algorithms for finding simple cycles of length at least k 3 and tree-minors in bounded-degree graphs. The complexity of these algorithms is...
Artur Czumaj, Oded Goldreich, Dana Ron, C. Seshadh...
55
Voted
IPCCC
2007
IEEE
15 years 4 months ago
Peer-to-Peer Multimedia Streaming Using BitTorrent
We propose a peer-to-peer multimedia streaming solution based on the BitTorrent content-distribution protocol. Our proposal includes two modifications that allow it to deliver mul...
Purvi Shah, Jehan-François Pâris
CANDC
2009
ACM
15 years 4 months ago
Subliminal wiretapping
Subliminal Wiretapping is a subtly interactive artwork that utilizes random number generation modified through mindmatter effects to supply a continuous stream of words. Frequent,...
Shawn Lawson
GLOBECOM
2009
IEEE
15 years 1 months ago
Adding Integrity Verification Capabilities to the LDPC-Staircase Erasure Correction Codes
File distribution is becoming a key technology, in particular in large scale content broadcasting systems like DVBH/SH. They largely rely on Application Level FEC codes (ALFEC) in ...
Mathieu Cunche, Vincent Roca
CISC
2007
Springer
129views Cryptology» more  CISC 2007»
15 years 1 months ago
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...
Chunxiang Gu, Yuefei Zhu, Heng Pan