Sciweavers

TIT
2008
187views more  TIT 2008»
13 years 4 months ago
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Abstract--In the bounded-storage model (BSM) for information-theoretic secure encryption and key agreement, one makes use of a random string R whose length t is greater than the as...
Stefan Dziembowski, Ueli M. Maurer
TIT
2008
149views more  TIT 2008»
13 years 4 months ago
An Improved Bound on the List Error Probability and List Distance Properties
A new upper bound on the list error probability is presented. This bound is derived by combining the techniques for obtaining the tangential union bound with an improved bound on t...
Irina E. Bocharova, Rolf Johannesson, Boris D. Kud...
TIT
2008
119views more  TIT 2008»
13 years 4 months ago
Bit-Level Equalization and Soft Detection for Gray-Coded Multilevel Modulation
This paper investigates iterative soft-in soft-out (SISO) detection in coded multiple access channels, with Gray-coded M-ary quadrature amplitude modulation (QAM) for the channel ...
Darryl Dexu Lin, Teng Joon Lim
TIT
2008
109views more  TIT 2008»
13 years 4 months ago
Statistical Analysis of Bayes Optimal Subset Ranking
Abstract--The ranking problem has become increasingly important in modern applications of statistical methods in automated decision making systems. In particular, we consider a for...
David Cossock, Tong Zhang
TIT
2008
123views more  TIT 2008»
13 years 4 months ago
Geometric Upper Bounds on Rates of Variable-Basis Approximation
In this paper, approximation by linear combinations of an increasing number n of computational units with adjustable parameters (such as perceptrons and radial basis functions) is ...
Vera Kurková, Marcello Sanguineti
TIT
2008
93views more  TIT 2008»
13 years 4 months ago
Aspects of Pairing Inversion
Abstract. We discuss some applications of the pairing inversion problem and outline some potential approaches for solving it. Our analysis of these approaches gives further evidenc...
Steven D. Galbraith, Florian Hess, Frederik Vercau...
TIT
2008
78views more  TIT 2008»
13 years 4 months ago
New Binary Sequences With Optimal Autocorrelation Magnitude
New binary sequences of period
Nam Yul Yu, Guang Gong
TIT
2008
86views more  TIT 2008»
13 years 4 months ago
A One-to-One Code and Its Anti-Redundancy
One-to-one codes are "one shot" codes that assign a distinct codeword to source symbols and are not necessarily prefix codes (more generally, uniquely decodable). For ex...
Wojciech Szpankowski
TIT
2008
83views more  TIT 2008»
13 years 4 months ago
The Information Lost in Erasures
Abstract--We consider sources and channels with memory observed through erasure channels. In particular, we examine the impact of sporadic erasures on the fundamental limits of los...
Sergio Verdú, Tsachy Weissman
TIT
2008
76views more  TIT 2008»
13 years 4 months ago
On the Role of Estimate-and-Forward With Time Sharing in Cooperative Communication
In this paper, we focus on the general relay channel. We investigate the application of the estimate-and-forward (EAF) relaying scheme to different scenarios. Specifically, we stud...
Ron Dabora, Sergio D. Servetto