Sciweavers

3608 search results - page 173 / 722
» computer 2011
Sort
View
PERCOM
2011
ACM
14 years 7 months ago
Inference attacks by third-party extensions to social network systems
—We study inference attacks that can be launched via the extension API of Facebook. We explain the threat of these attacks through a reduction to authentication attacks, devise a...
Seyed Hossein Ahmadinejad, Mohd M. Anwar, Philip W...
157
Voted
EUROCRYPT
2011
Springer
14 years 7 months ago
Making NTRU as Secure as Worst-Case Problems over Ideal Lattices
Abstract. NTRUEncrypt, proposed in 1996 by Hostein, Pipher and Silverman, is the fastest known lattice-based encryption scheme. Its moderate key-sizes, excellent asymptotic perfor...
Damien Stehlé, Ron Steinfeld
NETWORK
2011
14 years 10 months ago
Rethinking energy efficiency models of cellular networks with embodied energy
The continuous increase in energy consumption by cellular networks requires rethinking their energy efficiency. Current research indicates that one third of operating energy could...
Iztok Humar, Xiaohu Ge, Lin Xiang, Minho Jo, Min C...
CORR
2011
Springer
171views Education» more  CORR 2011»
14 years 7 months ago
Orthogonal Range Searching on the RAM, Revisited
We present a number of new results on one of the most extensively studied topics in computational geometry, orthogonal range searching. All our results are in the standard word RA...
Timothy M. Chan, Kasper Green Larsen, Mihai Patras...
ICCABS
2011
14 years 7 months ago
High-performance biocomputing for simulating the spread of contagion over large contact networks
Abstract—Many important biological problems can be modeled as contagion diffusion processes over interaction networks. This paper shows how the EpiSimdemics interaction-based sim...
Keith R. Bisset, Ashwin M. Aji, Madhav V. Marathe,...