Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Computer Science

Authors and titles for May 2010

Total of 676 entries : 1-25 26-50 51-75 76-100 ... 676-676
Showing up to 25 entries per page: fewer | more | all
[1] arXiv:1005.0027 [pdf, other]
Title: Learning from Multiple Outlooks
Maayan Harel, Shie Mannor
Comments: with full proofs of theorems and all experiments
Subjects: Machine Learning (cs.LG)
[2] arXiv:1005.0043 [pdf, other]
Title: A Framework For Fully-Simulatable $h$-Out-Of-$n$ Oblivious Transfer
Bing Zeng, Xueming Tang, Chingfang Hsu
Comments: submitted to IEEE transaction on information theory
Subjects: Cryptography and Security (cs.CR)
[3] arXiv:1005.0047 [pdf, other]
Title: A Geometric View of Conjugate Priors
Arvind Agarwal, Hal Daume III
Comments: 16 pages, 4 Figures
Subjects: Machine Learning (cs.LG)
[4] arXiv:1005.0052 [pdf, other]
Title: On the Joint Decoding of LDPC Codes and Finite-State Channels via Linear Programming
Byung-Hak Kim, Henry D. Pfister
Comments: To appear in Proc. 2010 IEEE Int. Symp. Information Theory, Ausin, TX, June 12-18, 2010 (a small error in the reference corrected)
Subjects: Information Theory (cs.IT)
[5] arXiv:1005.0053 [pdf, other]
Title: Global Linear Complexity Analysis of Filter Keystream Generators
A. Fúster-Sabater, P. Caballero-Gil
Journal-ref: IEE Proceedings Computers and Digital Techniques, January 1997, Volume 144, Issue 1, p.33-38
Subjects: Cryptography and Security (cs.CR)
[6] arXiv:1005.0054 [pdf, other]
Title: Secret Sharing Based on a Hard-on-Average Problem
P. Caballero-Gil, C. Hernández-Goya
Journal-ref: Linear Algebra and its Applications. Volume 414, Issues 2-3, 15 April 2006, Pages 626-631
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:1005.0055 [pdf, other]
Title: On the Design of Cryptographic Primitives
Pino Caballero-Gil, Amparo Fúster-Sabater
Journal-ref: Acta Applicandae Mathematicae. Volume 93, Numbers 1-3, pp. 279-297. Sept 2006. Springer.
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:1005.0058 [pdf, other]
Title: Linear solutions for cryptographic nonlinear sequence generators
A. Fúster-Sabater, P. Caballero-Gil
Journal-ref: Physics Letters A Vol. 369, Is. 5-6, 1 Oct. 2007, pp. 432-437
Subjects: Cryptography and Security (cs.CR)
[9] arXiv:1005.0072 [pdf, other]
Title: HyberLoc: Providing Physical Layer Location Privacy in Hybrid Sensor Networks
Rania El-Badry, Ahmed Sultan, Moustafa Youssef
Comments: 7 pages, 4 figures, ICC'10
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[10] arXiv:1005.0075 [pdf, other]
Title: Distributive Stochastic Learning for Delay-Optimal OFDMA Power and Subband Allocation
Ying Cui, Vincent K.N.Lau
Comments: To appear in Transactions on Signal Processing
Subjects: Machine Learning (cs.LG)
[11] arXiv:1005.0080 [pdf, other]
Title: Electronic Geometry Textbook: A Geometric Textbook Knowledge Management System
Xiaoyu Chen
Comments: To appear in The 9th International Conference on Mathematical Knowledge Management: MKM 2010
Subjects: Artificial Intelligence (cs.AI); Mathematical Software (cs.MS)
[12] arXiv:1005.0082 [pdf, other]
Title: A Rational Approach to Cryptographic Protocols
P. Caballero-Gil, C. Hernández-Goya, C. Bruno-Castañeda
Journal-ref: Mathematical and Computer Modelling. Volume 46, Issues 1-2, July 2007, Pages 80-87.
Subjects: Cryptography and Security (cs.CR)
[13] arXiv:1005.0085 [pdf, other]
Title: Using Smith Normal Forms and mu-Bases to Compute all the Singularities of Rational Planar Curves
Xiaohong Jia, Ron Goldman
Comments: journal
Subjects: Computational Geometry (cs.CG)
[14] arXiv:1005.0086 [pdf, other]
Title: Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences
Pino Caballero-Gil, Amparo Fúster-Sabater, Oscar Delgado-Mohatar
Journal-ref: Journal of Research and Practice in Information Technology, Vol. 40, No. 4, November 2008
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:1005.0087 [pdf, other]
Title: New Attack Strategy for the Shrinking Generator
Pino Caballero-Gil, Amparo Fúster-Sabater, M. Eugenia Pazo-Robles
Journal-ref: Journal of Research and Practice in Information Technology, Vol. 41, No. 2, May 2009
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:1005.0089 [pdf, other]
Title: The Exact Closest String Problem as a Constraint Satisfaction Problem
Tom Kelsey, Lars Kotthoff
Subjects: Artificial Intelligence (cs.AI)
[17] arXiv:1005.0092 [pdf, other]
Title: Influence of distortions of key frames on video transfer in wireless networks
E.S. Sagatov, A.M. Sukhov, P. Calyam
Comments: 6 pages, 4 figures, 2 Tables
Subjects: Networking and Internet Architecture (cs.NI); Multimedia (cs.MM)
[18] arXiv:1005.0095 [pdf, other]
Title: A Simple Attack on Some Clock-Controlled Generators
P. Caballero-Gil, A. Fúster-Sabater
Journal-ref: Computers & Mathematics with Applications. Vol. 58 , Is. 1 (July 2009) pp. 179-188
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:1005.0104 [pdf, other]
Title: Joint Structured Models for Extraction from Overlapping Sources
Rahul Gupta, Sunita Sarawagi
Subjects: Artificial Intelligence (cs.AI)
[20] arXiv:1005.0106 [pdf, other]
Title: Self-Organized Authentication in Mobile Ad-hoc Networks
P. Caballero-Gil, C. Hernández-Goya
Journal-ref: Journal of Communications and Networks. 2009 11: 509-517
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:1005.0108 [pdf, other]
Title: Using Linear Difference Equations to Model Nonlinear Cryptographic Sequences
P. Caballero-Gil, A. Fúster-Sabater, M.E. Pazo-Robles
Journal-ref: International Journal of Nonlinear Sciences & Numerical Simulation 11(3): 165-172, 2010
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:1005.0109 [pdf, other]
Title: Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
Sugata Sanyal, Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedhia, Nirali Mody
Comments: 12 Pg, 7 Fig, 2 Tables, Shorter version was presented in IWDC-2004, LNCS Vol.3326. ISBN: 3-540-24076-4,pp 541-542, 2004. NOTE: this http URL <this http URL contains all associated codes and its possible explanation.
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:1005.0117 [pdf, other]
Title: On the Separation of Lossy Source-Network Coding and Channel Coding in Wireline Networks
Shirin Jalali, Michelle Effros
Comments: 5 pages, to appear in the proceedings of 2010 IEEE International Symposium on Information Theory (ISIT)
Subjects: Information Theory (cs.IT)
[24] arXiv:1005.0125 [pdf, other]
Title: Adaptive Bases for Reinforcement Learning
Dotan Di Castro, Shie Mannor
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI)
[25] arXiv:1005.0129 [pdf, other]
Title: Slowly synchronizing automata and digraphs
Dmitry S. Ananichev, Vladimir V. Gusev, Mikhail V. Volkov
Comments: 13 pages, 5 figures
Journal-ref: In: A. Kucera, P. Hlineny (eds.), Mathematical Foundations of Computer Science [Lect. Notes Comp. Sci., 6281], Springer-Verlag, 2010, 55-65
Subjects: Formal Languages and Automata Theory (cs.FL); Discrete Mathematics (cs.DM)
Total of 676 entries : 1-25 26-50 51-75 76-100 ... 676-676
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack