Sciweavers

AAECC
2006
Springer
135views Algorithms» more  AAECC 2006»
13 years 5 months ago
Computing Hypergeometric Solutions of Linear Recurrence Equations
We describe a complete algorithm to compute the hypergeometric solutions of linear recurrence relations with rational function coefficients. We use the notion of finite singularit...
Thomas Cluzeau, Mark van Hoeij
AAECC
2006
Springer
90views Algorithms» more  AAECC 2006»
13 years 5 months ago
Apparent singularities of linear difference equations with polynomial coefficients
Sergei A. Abramov, Moulay A. Barkatou, Mark van Ho...
AAECC
2006
Springer
107views Algorithms» more  AAECC 2006»
13 years 6 months ago
On the Feng-Rao Bound for Generalized Hamming Weights
Olav Geil, Christian Thommesen
AAECC
2006
Springer
122views Algorithms» more  AAECC 2006»
13 years 8 months ago
Low-Floor Tanner Codes Via Hamming-Node or RSCC-Node Doping
We study the design of structured Tanner codes with low error-rate floors on the AWGN channel. The design technique involves the "doping" of standard LDPC (proto-)graphs,...
Shadi Abu-Surra, Gianluigi Liva, William E. Ryan
AAECC
2006
Springer
135views Algorithms» more  AAECC 2006»
13 years 11 months ago
Applying Fujisaki-Okamoto to Identity-Based Encryption
The Fujisaki-Okamoto (FO) conversion is widely known to be able to generically convert a weak public key encryption scheme, say one-way against chosen plaintext attacks (OW-CPA), t...
Peng Yang 0002, Takashi Kitagawa, Goichiro Hanaoka...
AAECC
2006
Springer
79views Algorithms» more  AAECC 2006»
13 years 11 months ago
New Bounds on the Capacity of Multi-dimensional RLL-Constrained Systems
Abstract. We examine the well-known problem of determining the capacity of multi-dimensional run-length-limited constrained systems. By recasting the problem, which is essentially ...
Moshe Schwartz, Alexander Vardy
AAECC
2006
Springer
74views Algorithms» more  AAECC 2006»
13 years 11 months ago
Nested Codes for Constrained Memory and for Dirty Paper
Abstract Dirty paper coding are relevant for wireless networks, multiuser channels, and digital watermarking. We show that the problem of dirty paper is essentially equivalent to s...
Hans Georg Schaathun, Gérard D. Cohen
AAECC
2006
Springer
117views Algorithms» more  AAECC 2006»
13 years 11 months ago
Quantum Period Reconstruction of Binary Sequences
Abstract. We consider the problem of determining the period of a binary sequence. For sequences with small autocorrelation we prove the existence of a polynomial time quantum algor...
Florina Piroi, Arne Winterhof
AAECC
2006
Springer
114views Algorithms» more  AAECC 2006»
13 years 11 months ago
Traitor Tracing Against Powerful Attacks Using Combinatorial Designs
This paper addresses the problem of threshold traitor tracing for digital content where, by embedding appropriate digital patterns into the distributed content, it is possible to t...
Simon McNicol, Serdar Boztas, Asha Rao
AAECC
2006
Springer
105views Algorithms» more  AAECC 2006»
13 years 11 months ago
LDPC Codes for Fading Channels: Two Strategies
Abstract. This paper compares two approaches to reliable communication over fading channels using low-density parity check (LDPC) codes. The particular model considered is the bloc...
Xiaowei Jin, Teng Li, Thomas E. Fuja, Oliver M. Co...