Sciweavers

682 search results - page 67 / 137
» Classifying arguments by scheme
Sort
View
JSAC
2008
159views more  JSAC 2008»
14 years 9 months ago
Limited feedback-based block diagonalization for the MIMO broadcast channel
Block diagonalization is a linear precoding technique for the multiple antenna broadcast (downlink) channel that involves transmission of multiple data streams to each receiver su...
Niranjay Ravindran, Nihar Jindal
ECCC
2011
185views ECommerce» more  ECCC 2011»
14 years 4 months ago
Property Testing Lower Bounds via Communication Complexity
We develop a new technique for proving lower bounds in property testing, by showing a strong connection between testing and communication complexity. We give a simple scheme for r...
Eric Blais, Joshua Brody, Kevin Matulef
CHES
2011
Springer
240views Cryptology» more  CHES 2011»
13 years 9 months ago
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
A lightweight and secure key storage scheme using silicon Physical Unclonable Functions (PUFs) is described. To derive stable PUF bits from chip manufacturing variations, a lightwe...
Meng-Day (Mandel) Yu, David M'Raïhi, Richard ...
ICMCS
2008
IEEE
193views Multimedia» more  ICMCS 2008»
15 years 4 months ago
Video coding with spatio-temporal texture synthesis and edge-based inpainting
This paper proposes a video coding scheme, in which textural and structural regions are selectively removed in the encoder, and restored in the decoder by spatio-temporal texture ...
Chunbo Zhu, Xiaoyan Sun, Feng Wu, Houqiang Li
CN
2007
111views more  CN 2007»
14 years 9 months ago
Key management for content access control in a hierarchy
The need for content access control in hierarchies (CACH) appears naturally in all contexts where a set of users have different access rights to a set of resources. The hierarchy...
H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Be...