Sciweavers

6907 search results - page 943 / 1382
» Securing distributed adaptation
Sort
View
121
Voted
PKC
2004
Springer
95views Cryptology» more  PKC 2004»
15 years 9 months ago
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups
Boneh and Venkatesan have proposed a polynomial time algorithm in a non-uniform model for recovering a ”hidden” element α ∈ IFp, where p is prime, from very short strings of...
Igor Shparlinski, Arne Winterhof
FOCS
2003
IEEE
15 years 8 months ago
On Worst-Case to Average-Case Reductions for NP Problems
We show that if an NP-complete problem has a non-adaptive self-corrector with respect to a samplable distribution then coNP is contained in NP/poly and the polynomial hierarchy co...
Andrej Bogdanov, Luca Trevisan
130
Voted
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
15 years 8 months ago
Peer-to-Peer Networks for Virtual Home Environments
This paper presents au approach to extend OSGi server based home networks with JXTA’s peer-topeer (PZP) technoIogy to a mzdti-server home environment connecting multiple private...
Chris Loeser, Wolfgang Müller 0003, Frank Ber...
96
Voted
ICRA
2003
IEEE
116views Robotics» more  ICRA 2003»
15 years 8 months ago
On the force capability of underactuated fingers
This paper studies the force capability of a particular class of underactuated fingers. Force capability is defined as the ability to create an external wrench onto a fixed obj...
Lionel Birglen, Clément Gosselin
WETICE
2003
IEEE
15 years 8 months ago
A Network Worm Vaccine Architecture
The ability of worms to spread at rates that effectively preclude human-directed reaction has elevated them to a first-class security threat to distributed systems. We present th...
Stelios Sidiroglou, Angelos D. Keromytis