Sciweavers

20 search results - page 3 / 4
» Weak Adversaries for the k-Server Problem
Sort
View
JSAC
2010
170views more  JSAC 2010»
14 years 6 months ago
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
Jamming-resistant communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. I...
Christina Pöpper, Mario Strasser, Srdjan Capk...
111
Voted
ESORICS
2009
Springer
16 years 8 days ago
Formal Indistinguishability Extended to the Random Oracle Model
Abstract. Several generic constructions for transforming one-way functions to asymmetric encryption schemes have been proposed. One-way functions only guarantee the weak secrecy of...
Cristian Ene, Yassine Lakhnech, Van Chan Ngo
SPAA
2004
ACM
15 years 5 months ago
The effect of faults on network expansion
We study the problem of how resilient networks are to node faults. Specifically, we investigate the question of how many faults a network can sustain and still contain a large (i...
Amitabha Bagchi, Ankur Bhargava, Amitabh Chaudhary...
ICTAC
2005
Springer
15 years 5 months ago
Revisiting Failure Detection and Consensus in Omission Failure Environments
It has recently been shown that fair exchange, a security problem in distributed systems, can be reduced to a fault tolerance problem, namely a special form of distributed consensu...
Carole Delporte-Gallet, Hugues Fauconnier, Felix C...
87
Voted
FOCS
2008
IEEE
15 years 6 months ago
Hardness of Minimizing and Learning DNF Expressions
We study the problem of finding the minimum size DNF formula for a function f : {0, 1}d → {0, 1} given its truth table. We show that unless NP ⊆ DTIME(npoly(log n) ), there i...
Subhash Khot, Rishi Saket