Sciweavers

4190 search results - page 548 / 838
» Type Class Directives
Sort
View
WINE
2010
Springer
251views Economy» more  WINE 2010»
15 years 2 months ago
The Complexity of Equilibria in Cost Sharing Games
We study Congestion Games with non-increasing cost functions (Cost Sharing Games) from a complexity perspective and resolve their computational hardness, which has been an open que...
Vasilis Syrgkanis
APPROX
2009
Springer
105views Algorithms» more  APPROX 2009»
15 years 2 months ago
Real-Time Message Routing and Scheduling
Abstract. Exchanging messages between nodes of a network (e.g., embedded computers) is a fundamental issue in real-time systems involving critical routing and scheduling decisions....
Ronald Koch, Britta Peis, Martin Skutella, Andreas...
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
15 years 2 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
CORR
2010
Springer
145views Education» more  CORR 2010»
15 years 2 months ago
Outer Bounds for the Interference Channel with a Cognitive Relay
In this paper, we first present an outer bound for a general interference channel with a cognitive relay, i.e., a relay that has non-causal knowledge of both independent messages t...
Stefano Rini, Daniela Tuninetti, Natasha Devroye
CORR
2010
Springer
146views Education» more  CORR 2010»
15 years 1 months ago
NLHB : A Non-Linear Hopper Blum Protocol
The Hopper-Blum (HB) protocol, which uses noised linear parities of a shared key for authentication, has been proposed for light-weight applications such as RFID. Recently, algorit...
Mukundan Madhavan, Andrew Thangaraj, Yogesh Sankar...