1
Published 2010
Table of Contents: ... and Generalisation: Footprints in Instance Space -- Adaptive Drift Analysis -- Optimizing Monotone Functions Can...
View full text
Electronic eBook
2
Published 2005
Table of Contents: ... Optical Networks -- A Parallel O(n27n/8) Time-Memory-Processor Tradeoff for Knapsack-Like Problems...
View full text
Electronic eBook
3
Published 2010
Table of Contents: ... Framework for Blade-Based Data Center -- Query Optimization over Parallel Relational Data Warehouses...
View full text
Electronic eBook
4
Published 2010
Table of Contents: ... for the Parallel Solution of Symmetric Tridiagonal Eigenvalue Problems -- A Parallel Solution of Large-Scale Heat...
View full text
Electronic eBook
5
Published 2015
Table of Contents: ... Security Policies Based on OrBAC -- Optimal Proximity Proofs -- Simpler CCA-Secure Public Key Encryption...
View full text
Electronic eBook
6
Published 2007
Table of Contents: ...Stream Ciphers -- An Analysis of the Hermes8 Stream Ciphers -- On the Security of the LILI Family...
View full text
Electronic eBook
7
Published 2013
Table of Contents: ... Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ... Salesman Problem -- Improved Inapproximability for Submodular Maximization -- Approximation Algorithms...
View full text
Electronic eBook
9
Published 2008
Table of Contents: ... and Solving Approaches -- Employing “Particle Swarm Optimization” and “Fuzzy Ranking Functions” for Direct...
View full text
Electronic eBook
10
Published 2015
Table of Contents: ... Improvements in Glowworm Swarm Optimization can Solve Real Life Problems -- Cryptanalysis of Transposition...
View full text
Electronic eBook
11
Published 2005
Table of Contents: ... Density Attacks to Low-Weight Knapsacks -- Efficient and Secure Elliptic Curve Point Multiplication Using...
View full text
Electronic eBook
12
Published 2014
Table of Contents: ... -- On the Fekete-Szegö Problem for Certain Subclass of Analytic Functions -- Bi-Objective Scheduling on Parallel...
View full text
Electronic eBook
13
Published 2010
Table of Contents: ... Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience -- Elliptic Curves...
View full text
Electronic eBook
14
Published 2012
Table of Contents: ...-malleability of the Fiat-Shamir Transform -- Another Look at Symmetric Incoherent Optimal Eavesdropping against...
View full text
Electronic eBook
15
Published 2006
Table of Contents: ... Application to Security Evaluation of the HB Protocols for RFID Authentication -- Hash Functions -- Update...
View full text
Electronic eBook
16
Published 2010
Table of Contents: ... for Heterogeneous Web Servers -- A Choice of Optimal Packet Dropping Function for Active Queue Management -- A...
View full text
Electronic eBook
17
Published 2005
Table of Contents: ... of Order r -- Towards Optimal Double-Length Hash Functions -- Design Principles -- Near Optimal Algorithms...
View full text
Electronic eBook
18
Published 2006
Table of Contents: ... -- Round-Optimal and Efficient Verifiable Secret Sharing -- Universally-Composible Security -- Generalized...
View full text
Electronic eBook
19
Published 2014
Table of Contents: ... -- Task Allocation in Ant Colonies -- Agreement Problems -- Communication-Efficient Randomized Consensus...
View full text
Electronic eBook
20
Published 2006
Table of Contents: ...Cryptanalysis -- Security Analysis of the Strong Diffie-Hellman Problem -- Cryptography in Theory...
View full text
Electronic eBook