Sciweavers

TIT
2008
84views more  TIT 2008»
13 years 4 months ago
Information Theoretic Bounds on Authentication Systems in Query Model
Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric key setting. Information theoretic bounds on the success probability...
Reihaneh Safavi-Naini, Peter R. Wild
TIT
2008
117views more  TIT 2008»
13 years 4 months ago
Cross-Layer Optimization of MAC and Network Coding in Wireless Queueing Tandem Networks
In wireless networks, throughput optimization is an essential performance objective that cannot be adequately characterized by a single criterion (such as the minimum transmitted o...
Yalin Evren Sagduyu, Anthony Ephremides
TIT
2008
82views more  TIT 2008»
13 years 4 months ago
Error Control Codes for Parallel Asymmetric Channels
We introduce and study error correcting codes for parallel synchronous communication via asymmetric channels. Constructions for error detecting/correcting codes are presented. Mor...
Rudolf Ahlswede, Harout K. Aydinian
TIT
2008
65views more  TIT 2008»
13 years 4 months ago
Power-Efficient Resource Allocation for Time-Division Multiple Access Over Fading Channels
We investigate resource allocation policies for time-division multiple access (TDMA) over fading channels in the power-limited regime. For frequency-flat block-fading channels and ...
Xin Wang, Georgios B. Giannakis
TIT
2008
81views more  TIT 2008»
13 years 4 months ago
Codes Defined by Forms of Degree 2 on Quadric Surfaces
We study the functional codes C2(X) defined on projective varieties X, in the case where X P3 is a 1-degenerate quadric or a non-degenerate quadric (hyperbolic or elliptic). We fi...
Frédéric A. B. Edoukou
TIT
2008
100views more  TIT 2008»
13 years 4 months ago
Communication Via Decentralized Processing
Abstract-- The common problem of a nomadic terminal sending information to a remote destination via agents with lossless connections is investigated. Such a setting suits, e.g. acc...
Amichai Sanderovich, Shlomo Shamai, Yossef Steinbe...
TIT
2008
147views more  TIT 2008»
13 years 4 months ago
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, the connections between codes, matroids, and a special cla...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
TIT
2008
103views more  TIT 2008»
13 years 4 months ago
Fast Distributed Algorithms for Computing Separable Functions
The problem of computing functions of values at the nodes in a network in a fully distributed manner, where nodes do not have unique identities and make decisions based only on loc...
Damon Mosk-Aoyama, Devavrat Shah
TIT
2008
68views more  TIT 2008»
13 years 4 months ago
On the Hardness of Decoding the Gale-Berlekamp Code
The Gale
Ron M. Roth, Krishnamurthy Viswanathan