Sciweavers

IPL
2016
54views more  IPL 2016»
9 years 12 months ago
On the greedy algorithm for the Shortest Common Superstring problem with reversals
Gabriele Fici, Tomasz Kociumaka, Jakub Radoszewski...
IPL
2016
42views more  IPL 2016»
9 years 12 months ago
Introducing the counter mode of operation to Compressed Sensing based encryption
Compressed Sensing based encryption is computationally secure in a one time key scenario, but it does not resist chosen plaintext attacks (CPA) due to the deterministic encryption...
Robin Fay
IPL
2016
53views more  IPL 2016»
9 years 12 months ago
The complexity of the Kth largest subset problem and related problems
We show that the Kth largest subset problem and the Kth largest m-tuple problem are in PP and hard for PP under polynomial-time Turing reductions. Several problems from the litera...
Christoph Haase, Stefan Kiefer
IPL
2016
47views more  IPL 2016»
9 years 12 months ago
A Denial of Service attack against fair computations using Bitcoin deposits
Bitcoin supports complex transactions where the recipient of a transaction can be programmatically determined. Using these transactions, multiparty computation protocols that aim ...
Jethro G. Beekman
IPL
2016
47views more  IPL 2016»
9 years 12 months ago
VNP=VP in the multilinear world
In this note, we show that over fields of any characteristic, exponential sums of Boolean instantiations of polynomials computed by multilinear circuits can be computed by multil...
Meena Mahajan, Nitin Saurabh, Sébastien Tav...
23
Voted
IPL
2016
51views more  IPL 2016»
9 years 12 months ago
On the semantics of Strategy Logic
We define and study a slight variation on the semantics of Strategy Logic: while in the classical semantics, all strategies are shifted during the evaluation of temporal modaliti...
Patricia Bouyer, Patrick Gardy, Nicolas Markey
IPL
2016
47views more  IPL 2016»
9 years 12 months ago
The (non-)existence of perfect codes in Fibonacci cubes
The Fibonacci cube Γn is obtained from the n-cube Qn by removing all the vertices that contain two consecutive 1s. It is proved that Γn admits a perfect code if and only if n ...
Ali Reza Ashrafi, Jernej Azarija, Azam Babai, Khad...
IOTJ
2016
51views more  IOTJ 2016»
9 years 12 months ago
Receiver Design for a Bionic Nervous System: Modeling the Dendritic Processing Power
Abstract—Intrabody nanonetworks for nervous system monitoring are envisioned as a key application of the Internet of Nano-Things paradigm, with the aim of developing radically ne...
Angela Sara Cacciapuoti, Marcello Caleffi
IOTJ
2016
45views more  IOTJ 2016»
9 years 12 months ago
Low-Weight Code Comparison for Electromagnetic Wireless Nanocommunication
—Electromagnetic communication among nanosensors using Time-Spread On-Off Keying (TS-OOK) modulation in Terahertz band promises very high transmission rates (up to several Terabi...
Muhammad Agus Zainuddin, Eugen Dedu, Julien Bourge...
IOTJ
2016
68views more  IOTJ 2016»
9 years 12 months ago
The Internet of Molecular Things Based on FRET
—Molecular devices, which consist of single or a few molecules, are envisioned to perform advanced tasks such as molecular information processing and collaborative sensing/actuat...
Murat Kuscu, Ozgur B. Akan