Sciweavers

6650 search results - page 1224 / 1330
» models 2009
Sort
View
117
Voted
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
15 years 7 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
ECSQARU
2009
Springer
15 years 7 months ago
A Note on Cumulative Stereotypical Reasoning
Abstract. We address the problem of providing a logical characterization of reasoning based on stereotypes. Following [6] we take a semantic perspective and we base our model on a ...
Giovanni Casini, Hykel Hosni
103
Voted
ESA
2009
Springer
149views Algorithms» more  ESA 2009»
15 years 7 months ago
On the Power of Uniform Power: Capacity of Wireless Networks with Bounded Resources
Abstract. The throughput capacity of arbitrary wireless networks under the physical Signal to Interference Plus Noise Ratio (SINR) model has received a greater deal of attention in...
Chen Avin, Zvi Lotker, Yvonne Anne Pignolet
87
Voted
ESA
2009
Springer
99views Algorithms» more  ESA 2009»
15 years 7 months ago
Minimizing Maximum Response Time and Delay Factor in Broadcast Scheduling
We consider online algorithms for pull-based broadcast scheduling. In this setting there are n pages of information at a server and requests for pages arrive online. When the serv...
Chandra Chekuri, Sungjin Im, Benjamin Moseley
ESWS
2009
Springer
15 years 7 months ago
SCOVO: Using Statistics on the Web of Data
Statistical data is present everywhere—from governmental bodies to economics, from life-science to industry. With the rise of the Web of Data, the need for sharing, accessing, an...
Michael Hausenblas, Wolfgang Halb, Yves Raimond, L...
« Prev « First page 1224 / 1330 Last » Next »