We gratefully acknowledge support from
the Simons Foundation and member institutions.

Computer Science

Authors and titles for May 2010

[ total of 634 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 626-634 ]
[ showing 25 entries per page: fewer | more | all ]
[1]  arXiv:1005.0027 [pdf, ps, other]
Title: Learning from Multiple Outlooks
Comments: with full proofs of theorems and all experiments
Subjects: Machine Learning (cs.LG)
[2]  arXiv:1005.0043 [pdf, ps, other]
Title: A Framework For Fully-Simulatable $h$-Out-Of-$n$ Oblivious Transfer
Comments: submitted to IEEE transaction on information theory
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:1005.0047 [pdf, other]
Title: A Geometric View of Conjugate Priors
Comments: 16 pages, 4 Figures
Subjects: Machine Learning (cs.LG)
[4]  arXiv:1005.0052 [pdf, ps, other]
Title: On the Joint Decoding of LDPC Codes and Finite-State Channels via Linear Programming
Comments: To appear in Proc. 2010 IEEE Int. Symp. Information Theory, Ausin, TX, June 12-18, 2010 (a small error in the reference corrected)
Subjects: Information Theory (cs.IT)
[5]  arXiv:1005.0053 [pdf, ps, other]
Title: Global Linear Complexity Analysis of Filter Keystream Generators
Journal-ref: IEE Proceedings Computers and Digital Techniques, January 1997, Volume 144, Issue 1, p.33-38
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:1005.0054 [pdf, ps, other]
Title: Secret Sharing Based on a Hard-on-Average Problem
Journal-ref: Linear Algebra and its Applications. Volume 414, Issues 2-3, 15 April 2006, Pages 626-631
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:1005.0055 [pdf, ps, other]
Title: On the Design of Cryptographic Primitives
Journal-ref: Acta Applicandae Mathematicae. Volume 93, Numbers 1-3, pp. 279-297. Sept 2006. Springer.
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:1005.0058 [pdf, ps, other]
Title: Linear solutions for cryptographic nonlinear sequence generators
Journal-ref: Physics Letters A Vol. 369, Is. 5-6, 1 Oct. 2007, pp. 432-437
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:1005.0072 [pdf, ps, other]
Title: HyberLoc: Providing Physical Layer Location Privacy in Hybrid Sensor Networks
Comments: 7 pages, 4 figures, ICC'10
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[10]  arXiv:1005.0075 [pdf, ps, other]
Title: Distributive Stochastic Learning for Delay-Optimal OFDMA Power and Subband Allocation
Comments: To appear in Transactions on Signal Processing
Subjects: Machine Learning (cs.LG)
[11]  arXiv:1005.0080 [pdf, other]
Title: Electronic Geometry Textbook: A Geometric Textbook Knowledge Management System
Authors: Xiaoyu Chen
Comments: To appear in The 9th International Conference on Mathematical Knowledge Management: MKM 2010
Subjects: Artificial Intelligence (cs.AI); Mathematical Software (cs.MS)
[12]  arXiv:1005.0082 [pdf, ps, other]
Title: A Rational Approach to Cryptographic Protocols
Journal-ref: Mathematical and Computer Modelling. Volume 46, Issues 1-2, July 2007, Pages 80-87.
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:1005.0085 [pdf, ps, other]
Title: Using Smith Normal Forms and mu-Bases to Compute all the Singularities of Rational Planar Curves
Comments: journal
Subjects: Computational Geometry (cs.CG)
[14]  arXiv:1005.0086 [pdf, ps, other]
Title: Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences
Journal-ref: Journal of Research and Practice in Information Technology, Vol. 40, No. 4, November 2008
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:1005.0087 [pdf, ps, other]
Title: New Attack Strategy for the Shrinking Generator
Journal-ref: Journal of Research and Practice in Information Technology, Vol. 41, No. 2, May 2009
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:1005.0089 [pdf, other]
Title: The Exact Closest String Problem as a Constraint Satisfaction Problem
Subjects: Artificial Intelligence (cs.AI)
[17]  arXiv:1005.0092 [pdf, other]
Title: Influence of distortions of key frames on video transfer in wireless networks
Comments: 6 pages, 4 figures, 2 Tables
Subjects: Networking and Internet Architecture (cs.NI); Multimedia (cs.MM)
[18]  arXiv:1005.0095 [pdf, other]
Title: A Simple Attack on Some Clock-Controlled Generators
Journal-ref: Computers & Mathematics with Applications. Vol. 58 , Is. 1 (July 2009) pp. 179-188
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:1005.0104 [pdf, other]
Title: Joint Structured Models for Extraction from Overlapping Sources
Subjects: Artificial Intelligence (cs.AI)
[20]  arXiv:1005.0106 [pdf, other]
Title: Self-Organized Authentication in Mobile Ad-hoc Networks
Journal-ref: Journal of Communications and Networks. 2009 11: 509-517
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:1005.0108 [pdf, ps, other]
Title: Using Linear Difference Equations to Model Nonlinear Cryptographic Sequences
Journal-ref: International Journal of Nonlinear Sciences & Numerical Simulation 11(3): 165-172, 2010
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:1005.0109 [pdf, ps, other]
Title: Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
Comments: 12 Pg, 7 Fig, 2 Tables, Shorter version was presented in IWDC-2004, LNCS Vol.3326. ISBN: 3-540-24076-4,pp 541-542, 2004. NOTE: AODV_modifications.zip <this http URL> contains all associated codes and its possible explanation.
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:1005.0117 [pdf, ps, other]
Title: On the Separation of Lossy Source-Network Coding and Channel Coding in Wireline Networks
Comments: 5 pages, to appear in the proceedings of 2010 IEEE International Symposium on Information Theory (ISIT)
Subjects: Information Theory (cs.IT)
[24]  arXiv:1005.0125 [pdf, ps, other]
Title: Adaptive Bases for Reinforcement Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI)
[25]  arXiv:1005.0129 [pdf, ps, other]
Title: Slowly synchronizing automata and digraphs
Comments: 13 pages, 5 figures
Journal-ref: In: A. Kucera, P. Hlineny (eds.), Mathematical Foundations of Computer Science [Lect. Notes Comp. Sci., 6281], Springer-Verlag, 2010, 55-65
Subjects: Formal Languages and Automata Theory (cs.FL); Discrete Mathematics (cs.DM)
[ total of 634 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 626-634 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2406, contact, help  (Access key information)