Sciweavers

93 search results - page 18 / 19
» List decoding algorithms for certain concatenated codes
Sort
View
JOC
2008
92views more  JOC 2008»
13 years 5 months ago
Cryptanalysis of an E0-like Combiner with Memory
In this paper, we study an E0-like combiner with memory as the keystream generator. First, we formulate a systematic and simple method to compute correlations of the FSM output seq...
Yi Lu 0002, Serge Vaudenay
VTC
2006
IEEE
147views Communications» more  VTC 2006»
13 years 11 months ago
A Proportional Fair Scheduling for Multicast Services in Wireless Cellular Networks
— We propose a new multicast scheduling scheme which can achieve the proportional fair (PF) allocation in the wireless cellular systems. In case of multicast, the scheduler in th...
Chungha Koh, Young Yong Kim
ECCC
1998
118views more  ECCC 1998»
13 years 5 months ago
Chinese Remaindering with Errors
The Chinese Remainder Theorem states that a positive integer m is uniquely speci ed by its remainder modulo k relatively prime integers p1;:::;pk, provided m < Qk i=1 pi. Thus ...
Oded Goldreich, Dana Ron, Madhu Sudan
CODES
2004
IEEE
13 years 9 months ago
Operation tables for scheduling in the presence of incomplete bypassing
Register bypassing is a powerful and widely used feature in modern processors to eliminate certain data hazards. Although complete bypassing is ideal for performance, bypassing ha...
Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, ...
STOC
2003
ACM
124views Algorithms» more  STOC 2003»
14 years 5 months ago
Extractors: optimal up to constant factors
This paper provides the first explicit construction of extractors which are simultaneously optimal up to constant factors in both seed length and output length. More precisely, fo...
Chi-Jen Lu, Omer Reingold, Salil P. Vadhan, Avi Wi...