Sciweavers

339 search results - page 41 / 68
» An ADC-BiST scheme using sequential code analysis
Sort
View
TIT
2010
130views Education» more  TIT 2010»
14 years 9 months ago
Pseudo-random functions and parallelizable modes of operations of a block cipher
This paper considers the construction and analysis of pseudo-random functions (PRFs) with specific reference to modes of operations of a block cipher. In the context of message aut...
Palash Sarkar
ICASSP
2008
IEEE
15 years 9 months ago
A realistic performance analysis for practical channel-aware scheduling
It is well-known that opportunistic transmission schemes are sumcapacity optimal, in the Shannon sense, for symmetric cellular networks with single-antenna transceivers. However, ...
Pengcheng Zhan, Ramesh Annavajjala, A. Lee Swindle...
BMCBI
2005
125views more  BMCBI 2005»
15 years 3 months ago
Multiple sequence alignments of partially coding nucleic acid sequences
Background: High quality sequence alignments of RNA and DNA sequences are an important prerequisite for the comparative analysis of genomic sequence data. Nucleic acid sequences, ...
Roman R. Stocsits, Ivo L. Hofacker, Claudia Fried,...
FC
2005
Springer
110views Cryptology» more  FC 2005»
15 years 8 months ago
Approximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly s...
Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, ...
STOC
2004
ACM
134views Algorithms» more  STOC 2004»
16 years 3 months ago
Better extractors for better codes?
We present an explicit construction of codes that can be list decoded from a fraction (1 - ) of errors in sub-exponential time and which have rate / logO(1) (1/). This comes close...
Venkatesan Guruswami