Sciweavers

64
Voted
JCSS
2006
47views more  JCSS 2006»
15 years 4 days ago
Maximizing data locality in distributed systems
Fan R. K. Chung, Ronald L. Graham, Ranjita Bhagwan...
77
Voted
JCSS
2006
56views more  JCSS 2006»
15 years 4 days ago
Determining model accuracy of network traces
Accurate network modeling is critical to the design of network protocols. Traditional modeling approaches, such as Discrete Time Markov Chains (DTMC) are limited in their ability ...
Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph
83
Voted
JCSS
2006
63views more  JCSS 2006»
15 years 4 days ago
Error-bounded probabilistic computations between MA and AM
We introduce the probabilistic class SBP which is defined in a BPP-like manner. This class emerges from BPP by keeping the promise of a probability gap but decreasing the probabil...
Elmar Böhler, Christian Glaßer, Daniel ...
JCSS
2006
102views more  JCSS 2006»
15 years 4 days ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh
70
Voted
JCSS
2006
35views more  JCSS 2006»
15 years 4 days ago
Compression-based fixed-parameter algorithms for feedback vertex set and edge bipartization
Jiong Guo, Jens Gramm, Falk Hüffner, Rolf Nie...
60
Voted
JCSS
2006
59views more  JCSS 2006»
15 years 4 days ago
Extractors from Reed-Muller codes
Amnon Ta-Shma, David Zuckerman, Shmuel Safra
71
Voted
JCSS
2006
52views more  JCSS 2006»
15 years 4 days ago
LWPP and WPP are not uniformly gap-definable
Resolving an issue open since Fenner, Fortnow, and Kurtz raised it in [FFK94], we prove that LWPP is not uniformly gap-definable and that WPP is not uniformly gap-definable. We do...
Holger Spakowski, Rahul Tripathi
72
Voted
JCSS
2006
47views more  JCSS 2006»
15 years 4 days ago
A password authentication scheme over insecure networks
I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang
90
Voted
JCSS
2006
77views more  JCSS 2006»
15 years 4 days ago
Sequential predictions based on algorithmic complexity
This paper studies sequence prediction based on the monotone Kolmogorov complexity Km=-log m, i.e. based on universal deterministic/one-part MDL. m is extremely close to Solomonof...
Marcus Hutter
64
Voted
JCSS
2006
43views more  JCSS 2006»
15 years 4 days ago
Infinite-state high-level MSCs: Model-checking and realizability
Blaise Genest, Anca Muscholl, Helmut Seidl, Marc Z...