Sciweavers

411 search results - page 82 / 83
» Algebraic Imperative Specifications
Sort
View
CORR
2010
Springer
184views Education» more  CORR 2010»
14 years 11 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
CORR
2010
Springer
179views Education» more  CORR 2010»
14 years 9 months ago
The DMM bound: multivariate (aggregate) separation bounds
In this paper we derive aggregate separation bounds, named after Davenport-MahlerMignotte (DMM), on the isolated roots of polynomial systems, specifically on the minimum distance ...
Ioannis Z. Emiris, Bernard Mourrain, Elias P. Tsig...
116
Voted
ACCV
2010
Springer
14 years 6 months ago
Minimal Representations for Uncertainty and Estimation in Projective Spaces
Abstract. Estimation using homogeneous entities has to cope with obstacles such as singularities of covariance matrices and redundant parametrizations which do not allow an immedia...
Wolfgang Förstner
CAE
2010
14 years 6 months ago
Learning about Shadows from Artists
Renaissance artists discovered methods for imaging realistic depth on a two dimensional surface by re-inventing linear perspective. In solving the problem of depth depiction, they...
Elodie Fourquet
113
Voted
TIT
2010
136views Education» more  TIT 2010»
14 years 6 months ago
The existence of concatenated codes list-decodable up to the hamming bound
We prove that binary linear concatenated codes with an outer algebraic code (specifically, a folded Reed-Solomon code) and independently and randomly chosen linear inner codes ach...
Venkatesan Guruswami, Atri Rudra