Sciweavers

148 search results - page 12 / 30
» The random Tukey depth
Sort
View
CRYPTO
2006
Springer
224views Cryptology» more  CRYPTO 2006»
15 years 5 months ago
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the...
Xavier Boyen, Brent Waters
CORR
2010
Springer
101views Education» more  CORR 2010»
15 years 1 months ago
Circuits with arbitrary gates for random operators
We consider boolean circuits computing n-operators f : {0, 1}n {0, 1}n . As gates we allow arbitrary boolean functions; neither fanin nor fanout of gates is restricted. An operat...
Stasys Jukna, Georg Schnitger
SPAA
2009
ACM
15 years 11 months ago
A randomized, o(log w)-depth 2 smoothing network
A K-smoothing network is a distributed, low-contention data structure where tokens arrive arbitrarily on w input wires and reach w output wires via their completely asynchronous p...
Marios Mavronicolas, Thomas Sauerwald
CP
2004
Springer
15 years 7 months ago
Statistical Regimes Across Constrainedness Regions
Abstract. Much progress has been made in terms of boosting the effectiveness of backtrack style search methods. In addition, during the last decade, a much better understanding of ...
Carla P. Gomes, Cèsar Fernández, Bar...
99
Voted
APPROX
2008
Springer
100views Algorithms» more  APPROX 2008»
15 years 3 months ago
Optimal Random Matchings on Trees and Applications
In this paper we will consider tight upper- and lower-bounds on the weight of the optimal matching for random point sets distributed among the leaves of a tree, as a function of it...
Jeff Abrahamson, Béla Csaba, Ali Shokoufand...