Results 1  10
of
404,531
The SmallWorld Phenomenon: An Algorithmic Perspective
 in Proceedings of the 32nd ACM Symposium on Theory of Computing
, 2000
"... Long a matter of folklore, the “smallworld phenomenon ” — the principle that we are all linked by short chains of acquaintances — was inaugurated as an area of experimental study in the social sciences through the pioneering work of Stanley Milgram in the 1960’s. This work was among the first to m ..."
Abstract

Cited by 823 (5 self)
 Add to MetaCart
that no decentralized algorithm, operating with local information only, can construct short paths in these networks with nonnegligible probability. We then define an infinite family of network models that naturally generalizes the WattsStrogatz model, and show that for one of these models, there is a decentralized
Boosting combinatorial search through randomization
, 1998
"... Unpredictability in the running time of complete search procedures can often be explained by the phenomenon of “heavytailed cost distributions”, meaning that at any time during the experiment there is a nonnegligible probability of hitting a problem that requires exponentially more time to solve t ..."
Abstract

Cited by 360 (35 self)
 Add to MetaCart
Unpredictability in the running time of complete search procedures can often be explained by the phenomenon of “heavytailed cost distributions”, meaning that at any time during the experiment there is a nonnegligible probability of hitting a problem that requires exponentially more time to solve
Loopy belief propagation for approximate inference: An empirical study. In:
 Proceedings of Uncertainty in AI,
, 1999
"... Abstract Recently, researchers have demonstrated that "loopy belief propagation" the use of Pearl's polytree algorithm in a Bayesian network with loops can perform well in the context of errorcorrecting codes. The most dramatic instance of this is the near Shannonlimit performanc ..."
Abstract

Cited by 674 (15 self)
 Add to MetaCart
marginals at the last two iterations. We only plot the diseases which had nonnegligible posterior probability. Loopy Belief Propagation . s=o� . a' range of prior To test this hypothesis, we reparameterized the pyra mid network as follows: we set the prior probability of the "1"
Weaknesses in the Key Scheduling Algorithm of RC4
 PROCEEDINGS OF THE 4TH ANNUAL WORKSHOP ON SELECTED AREAS OF CRYPTOGRAPHY
, 2001
"... In this paper we present several weaknesses in the key scheduling algorithm of RC4, and describe their cryptanalytic significance. We identify a large number of weak keys, in which knowledge of a small number of key bits suffices to determine many state and output bits with nonnegligible probabilit ..."
Abstract

Cited by 268 (1 self)
 Add to MetaCart
In this paper we present several weaknesses in the key scheduling algorithm of RC4, and describe their cryptanalytic significance. We identify a large number of weak keys, in which knowledge of a small number of key bits suffices to determine many state and output bits with nonnegligible
HigherOrder Cryptanalysis of Block Ciphers
, 1999
"... The theme in this thesis is design and analysis of block ciphers. Specifically, new attacks are described that successfully break cryptosystems in which the ciphertext is expressible as evaluations of some lowdegree polynomial in the plaintext with a low but nonnegligible probability. The attacks ..."
Abstract

Cited by 6 (0 self)
 Add to MetaCart
The theme in this thesis is design and analysis of block ciphers. Specifically, new attacks are described that successfully break cryptosystems in which the ciphertext is expressible as evaluations of some lowdegree polynomial in the plaintext with a low but nonnegligible probability. The attacks
Variance Estimation For Imputed Survey Data With NonNegligible Sampling Fractions
"... We consider variance estimation for HorvitzThompson type estimated totals based on survey data with imputed nonrespondents and with nonnegligible sampling fractions. A method based on a variance decomposition is proposed. Our method can be applied to complicated situations where a composite of som ..."
Abstract

Cited by 1 (1 self)
 Add to MetaCart
We consider variance estimation for HorvitzThompson type estimated totals based on survey data with imputed nonrespondents and with nonnegligible sampling fractions. A method based on a variance decomposition is proposed. Our method can be applied to complicated situations where a composite
Throughout the Milky Way’s history, a nonnegligible fraction of s...
, 2004
"... We have derived the star formation history of the Milky Way disk over the last 2 Gyr with a time resolution of 0.05 Gyr from the age distribution diagram of a large sample of open clusters comprising more than 580 objects. By interpreting the age distribution diagram using numerical results from an ..."
Abstract
 Add to MetaCart
We have derived the star formation history of the Milky Way disk over the last 2 Gyr with a time resolution of 0.05 Gyr from the age distribution diagram of a large sample of open clusters comprising more than 580 objects. By interpreting the age distribution diagram using numerical results from an extensive library of Nbody calculations carried out during the last ten years, we reconstruct the recent star formation history of the Milky Way disk. Under the assumption that the disk has never been polluted by any extragalactic stellar populations, our analysis suggests that superimposed on a relatively small level of constant star formation activity mainly in smallN star clusters, the star formation rate has experienced at least 5 episodes of enhanced star formation lasting about 0.2 Gyr with production of larger clusters. This cyclic behavior shows a period of 0.4±0.1 Gyr and could be the result of density waves and/or interactions with satellite galaxies. On the other hand, the star formation rate history from a volumelimited sample of open clusters in the solar neighbourhood appears to be consistent with the overall star formation history obtained from the entire sample. Pure continuous star formation both in
Elections Can be Manipulated Often
"... The GibbardSatterthwaite theorem states that every nontrivial voting method between at least 3 alternatives can be strategically manipulated. We prove a quantitative version of the GibbardSatterthwaite theorem: a random manipulation by a single random voter will succeed with nonnegligible probab ..."
Abstract

Cited by 66 (1 self)
 Add to MetaCart
The GibbardSatterthwaite theorem states that every nontrivial voting method between at least 3 alternatives can be strategically manipulated. We prove a quantitative version of the GibbardSatterthwaite theorem: a random manipulation by a single random voter will succeed with nonnegligible
Tracing Traitors
, 1994
"... We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in the context of pay television, where only paying customers should be able to view certain programs. In this application ..."
Abstract

Cited by 172 (10 self)
 Add to MetaCart
probability. Since there is typically little demand for decoders which decrypt only a small fraction of the transmissions (even if it is nonnegligible), we further introduce threshold tracing schemes which can only be used against decoders which succeed in decryption with probability greater than some
On The Power Of TwoPoints Based Sampling
 Journal of Complexity
, 1989
"... The purpose of this note is to present a new sampling technique and to demonstrate some of its properties. The new technique consists of picking two elements at random, and deterministically generating (from them) a long sequence of pairwise independent elements. The sequence is guarantees to inters ..."
Abstract

Cited by 98 (17 self)
 Add to MetaCart
to intersect, with high probability, any set of nonnegligible density. 1. Introduction In recent years the role of randomness in computation has become more and more dominant. Randomness was used to speed up sequential computations (e.g. primality testing, testing polynomial identities etc.), but its effect
Results 1  10
of
404,531