Sciweavers

1576 search results - page 299 / 316
» Streaming Algorithms for Independent Sets
Sort
View
ICS
2010
Tsinghua U.
15 years 8 months ago
Non-Malleable Codes
We introduce the notion of "non-malleable codes" which relaxes the notion of error-correction and errordetection. Informally, a code is non-malleable if the message cont...
Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wic...
EWSN
2010
Springer
15 years 8 months ago
Phoenix: An Epidemic Approach to Time Reconstruction
Abstract. Harsh deployment environments and uncertain run-time conditions create numerous challenges for postmortem time reconstruction methods. For example, motes often reboot and...
Jayant Gupchup, Douglas Carlson, Razvan Musaloiu-E...
ICML
2009
IEEE
15 years 6 months ago
Non-monotonic feature selection
We consider the problem of selecting a subset of m most informative features where m is the number of required features. This feature selection problem is essentially a combinator...
Zenglin Xu, Rong Jin, Jieping Ye, Michael R. Lyu, ...
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
15 years 6 months ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron
EDOC
2006
IEEE
15 years 5 months ago
Service Interaction Modeling: Bridging Global and Local Views
In a Service-Oriented Architecture (SOA), a system is viewed as a collection of independent units (services) that interact with one another through message exchanges. Established ...
Johannes Maria Zaha, Marlon Dumas, Arthur H. M. te...