Sciweavers

3381 search results - page 182 / 677
» adaptive 2007
Sort
View
TCC
2007
Springer
124views Cryptology» more  TCC 2007»
15 years 7 months ago
Tackling Adaptive Corruptions in Multicast Encryption Protocols
We prove a computational soundness theorem for symmetric-key encryption protocols that can be used to analyze security against adaptively corrupting adversaries (that is, adversar...
Saurabh Panjwani
123
Voted
ICALP
2007
Springer
15 years 2 months ago
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
Aggelos Kiayias, Hong-Sheng Zhou
106
Voted
ICDE
2007
IEEE
120views Database» more  ICDE 2007»
15 years 7 months ago
Optimizing State-Intensive Non-Blocking Queries Using Run-time Adaptation
Main memory is a critical resource when processing non-blocking queries with state intensive operators that require real-time responses. While partitioned parallel processing can ...
Bin Liu, Mariana Jbantova, Elke A. Rundensteiner
129
Voted
SSDBM
2007
IEEE
212views Database» more  SSDBM 2007»
15 years 7 months ago
Adaptive-Size Reservoir Sampling over Data Streams
Reservoir sampling is a well-known technique for sequential random sampling over data streams. Conventional reservoir sampling assumes a fixed-size reservoir. There are situation...
Mohammed Al-Kateb, Byung Suk Lee, Xiaoyang Sean Wa...
126
Voted
VTC
2007
IEEE
125views Communications» more  VTC 2007»
15 years 7 months ago
Channel Decoder Assisted Adaptive Coding and Modulation for HAP Communications
Provision of mobile broadband wireless access, for instance via high altitude platforms (HAPs) to the passengers on a high-speed train, requires the development of efficient and r...
Miha Smolnikar, Tomaz Javornik, Mihael Mohorcic