Zobrazeno 1 - 10
of 589
pro vyhledávání: '"Ta-Shma A"'
Data skipping reduces I/O for SQL queries by skipping over irrelevant data objects (files) based on their metadata. We extend this notion by allowing developers to define their own data skipping metadata types and indexes using a flexible API. Our fr
Externí odkaz:
http://arxiv.org/abs/2009.08150
We provide enhanced security against insider attacks in services that manage extremely sensitive data. One example is a #MeToo use case where sexual harassment complaints are reported but only revealed when another complaint is filed against the same
Externí odkaz:
http://arxiv.org/abs/1808.02708
Publikováno v:
Theory of Computing 3(3):45-60, 2007
$ \newcommand{\eps}{\epsilon} \newcommand{\NP}{\mathsf{NP}} \newcommand{\YES}{\mathsf{YES}} \newcommand{\NO}{\mathsf{NO}} \newcommand{\myminus}{\text{-}}\newcommand{\Bsat}{{\mathsf{B}}} \newcommand{\threesat}{\rm{3}\myminus\mathsf{SAT}} \newcommand{\
Externí odkaz:
http://arxiv.org/abs/1806.04080
Autor:
Gerard W. Dougherty, Katsutoshi Mizuno, Tabea Nöthe-Menchen, Yayoi Ikawa, Karsten Boldt, Asaf Ta-Shma, Isabella Aprea, Katsura Minegishi, Yuan-Ping Pang, Petra Pennekamp, Niki T. Loges, Johanna Raidt, Rim Hjeij, Julia Wallmeier, Huda Mussaffi, Zeev Perles, Orly Elpeleg, Franziska Rabert, Hidetaka Shiratori, Stef J. Letteboer, Nicola Horn, Samuel Young, Timo Strünker, Friederike Stumme, Claudius Werner, Heike Olbrich, Katsuyoshi Takaoka, Takahiro Ide, Wang Kyaw Twan, Luisa Biebach, Jörg Große-Onnebrink, Judith A. Klinkenbusch, Kavita Praveen, Diana C. Bracht, Inga M. Höben, Katrin Junger, Jana Gützlaff, Sandra Cindrić, Micha Aviram, Thomas Kaiser, Yasin Memari, Petras P. Dzeja, Bernd Dworniczak, Marius Ueffing, Ronald Roepman, Kerstin Bartscherer, Nicholas Katsanis, Erica E. Davis, Israel Amirav, Hiroshi Hamada, Heymut Omran
Publikováno v:
Nature Communications, Vol 11, Iss 1, Pp 1-20 (2020)
The mechanism by which adenosine monophosphate modulates dynein ATPase-mediated ciliary and flagellar beating remains obscure. Here the authors identify an axonemal module including cilia and flagella associated protein 45 that supports adenine nucle
Externí odkaz:
https://doaj.org/article/ab0a6ca10924497e88909fc70b971840
Autor:
Arnon-Friedman, Rotem, Ta-Shma, Amnon
Publikováno v:
Phys. Rev. A 86, 062333 (2012)
The task of privacy amplification, in which Alice holds some partially secret information with respect to an adversary Eve and wishes to distill it until it is completely secret, is known to be solvable almost optimally both in the classical and quan
Externí odkaz:
http://arxiv.org/abs/1211.1125
In the past few years there was a growing interest in proving the security of cryptographic protocols, such as key distribution protocols, from the sole assumption that the systems of Alice and Bob cannot signal to each other. This can be achieved by
Externí odkaz:
http://arxiv.org/abs/1205.3736
Autor:
Ben-Aroya, Avraham, Ta-Shma, Amnon
We construct a strong extractor against quantum storage that works for every min-entropy $k$, has logarithmic seed length, and outputs $\Omega(k)$ bits, provided that the quantum adversary has at most $\beta k$ qubits of memory, for any $\beta < \hal
Externí odkaz:
http://arxiv.org/abs/1004.3737
Autor:
Ben-Aroya, Avraham, Ta-Shma, Amnon
Most of the research done on quantum error correction studies an error model in which each qubit is affected by noise, independently of the other qubits. In this paper we study a different noise model -- one in which the noise may be correlated with
Externí odkaz:
http://arxiv.org/abs/0909.1466
Autor:
Ben-Aroya, Avraham, Ta-Shma, Amnon
The diamond norm is a norm defined over the space of quantum transformations. This norm has a natural operational interpretation: it measures how well one can distinguish between two transformations by applying them to a state of arbitrarily large di
Externí odkaz:
http://arxiv.org/abs/0902.3397
Autor:
Ta-Shma, Amnon
Some, but not all, extractors resist adversaries with limited quantum storage. In this paper we show that Trevisan's extractor has this property, thereby showing an extractor against quantum storage with logarithmic seed length.
Externí odkaz:
http://arxiv.org/abs/0808.1994