Sciweavers

27692 search results - page 170 / 5539
» Where is ...
Sort
View
81
Voted
PODS
2004
ACM
109views Database» more  PODS 2004»
16 years 29 days ago
On the Complexity of Optimal K-Anonymity
The technique of k-anonymization has been proposed in the literature as an alternative way to release public information, while ensuring both data privacy and data integrity. We p...
Adam Meyerson, Ryan Williams
86
Voted
ICSE
2005
IEEE-ACM
16 years 27 days ago
Locating causes of program failures
Which is the defect that causes a software failure? By comparing the program states of a failing and a passing run, we can identify the state differences that cause the failure. H...
Holger Cleve, Andreas Zeller
PERCOM
2004
ACM
16 years 12 days ago
Analyzing Connectivity-Based Multi-Hop Ad-hoc Positioning
We investigate the theoretical limits of positioning algorithms. In particular, we study scenarios where the nodes do not receive anchors directly (multi-hop) and where no physica...
Regina Bischoff, Roger Wattenhofer
95
Voted
DCC
2008
IEEE
16 years 12 days ago
Extractors for binary elliptic curves
We propose a simple and efficient deterministic extractor for an ordinary elliptic curve E, defined over F2n , where n = 2 and is a positive integer. Our extractor, for a given poi...
Reza Rezaeian Farashahi, Ruud Pellikaan, Andrey Si...
83
Voted
DCC
2004
IEEE
16 years 12 days ago
Register Synthesis for Algebraic Feedback Shift Registers Based on Non-Primes
In this paper, we describe a solution to the register synthesis problem for a class of sequence generators known as Algebraic Feedback Shift Registers. These registers are based o...
Andrew Klapper, Jinzhong Xu