Sciweavers

288 search results - page 24 / 58
» random 1998
Sort
View
105
Voted
FSE
1998
Springer
102views Cryptology» more  FSE 1998»
15 years 4 months ago
Cryptanalytic Attacks on Pseudorandom Number Generators
In this paper we discuss PRNGs: the mechanisms used by real-world secure systems to generate cryptographic keys, initialization vectors, "random" nonces, and other values...
John Kelsey, Bruce Schneier, David Wagner, Chris H...
85
Voted
WSC
1998
15 years 1 months ago
Input Modeling Tools for Complex Problems
A simulation model is composed of inputs and logic; the inputs represent the uncertainty or randomness in the system, while the logic determines how the system reacts to the uncer...
Barry L. Nelson, Michael Yamnitsky
58
Voted
RSA
1998
53views more  RSA 1998»
15 years 2 days ago
Recursive reconstruction on periodic trees
A periodic tree Tn consists of full n-level copies of a finite tree T. The tree Tn is labeled by random bits. The root label is chosen randomly, and the probability of two adjace...
Elchanan Mossel
108
Voted
SIAMCOMP
1998
137views more  SIAMCOMP 1998»
15 years 2 days ago
Primal-Dual RNC Approximation Algorithms for Set Cover and Covering Integer Programs
We build on the classical greedy sequential set cover algorithm, in the spirit of the primal-dual schema, to obtain simple parallel approximation algorithms for the set cover probl...
Sridhar Rajagopalan, Vijay V. Vazirani
143
Voted
CORR
2011
Springer
215views Education» more  CORR 2011»
14 years 7 months ago
The total path length of split trees
We consider the model of random trees introduced by Devroye [SIAM J Comput 28, 409– 432, 1998]. The model encompasses many important randomized algorithms and data structures. T...
Nicolas Broutin, Cecilia Holmgren