Sciweavers

44 search results - page 3 / 9
» Constructing Good Covering Codes for Applications in Stegano...
Sort
View
IMA
2001
Springer
80views Cryptology» more  IMA 2001»
13 years 9 months ago
Spectrally Bounded Sequences, Codes, and States: Graph Constructions and Entanglement
A recursive construction is provided for sequence sets which possess good Hamming Distance and low Peak-to-Average Power Ratio (PAR) under any Local Unitary Unimodular Transform. W...
Matthew G. Parker
HPDC
2008
IEEE
13 years 5 months ago
Code coverage, performance approximation and automatic recognition of idioms in scientific applications
Basic data flow patterns which we call idioms, such as stream, transpose, reduction, random access and stencil, are common in scientific numerical applications. We hypothesize tha...
Jiahua He, Allan Snavely, Rob F. Van der Wijngaart...
TIT
1998
127views more  TIT 1998»
13 years 5 months ago
On a New Class of Codes for Identifying Vertices in Graphs
—We investigate a new class of codes for the optimal covering of vertices in an undirected graph Gsuch that any vertex in G can be uniquely identified by examining the vertices ...
Mark G. Karpovsky, Krishnendu Chakrabarty, Lev B. ...
CRYPTO
1999
Springer
109views Cryptology» more  CRYPTO 1999»
13 years 9 months ago
Coding Constructions for Blacklisting Problems without Computational Assumptions
Abstract. We consider the broadcast exclusion problem: how to transmit a message over a broadcast channel shared by N = 2n users so that all but some specified coalition of k excl...
Ravi Kumar, Sridhar Rajagopalan, Amit Sahai
HASE
2008
IEEE
13 years 11 months ago
An Interaction-Based Test Sequence Generation Approach for Testing Web Applications
Web applications often use dynamic pages that interact with each other by accessing shared objects, e.g., session objects. Interactions between dynamic pages need to be carefully ...
Wenhua Wang, Sreedevi Sampath, Yu Lei, Raghu Kacke...