Sciweavers

238 search results - page 28 / 48
» Covering Codes for Hats-on-a-line
Sort
View
SSR
2001
146views more  SSR 2001»
14 years 11 months ago
Implementing product line variabilities
Software product lines have numerous members. Thus, a product line infrastructure must cover various systems. This is the significant difference to usual software systems and the ...
Cristina Gacek, Michalis Anastasopoules
CORR
2006
Springer
87views Education» more  CORR 2006»
14 years 9 months ago
Capacity of a Class of Deterministic Relay Channels
Abstract-- The capacity of a class of deterministic relay channels with the transmitter input X, the receiver output Y , the relay output Y1 = f(X, Y ), and a separate communicatio...
Thomas M. Cover, Young-Han Kim
87
Voted
TIT
2008
78views more  TIT 2008»
14 years 9 months ago
Recursive Lower Bounds on the Nonlinearity Profile of Boolean Functions and Their Applications
The nonlinearity profile of a Boolean function (i.e. the sequence of its minimum Hamming distances nlr(f) to all functions of degrees at most r, for r 1) is a cryptographic crite...
Claude Carlet
CORR
2011
Springer
259views Education» more  CORR 2011»
14 years 4 months ago
Automatic Optimization for MapReduce Programs
The MapReduce distributed programming framework has become popular, despite evidence that current implementations are inefficient, requiring far more hardware than a traditional r...
Eaman Jahani, Michael J. Cafarella, Christopher R&...
IACR
2011
82views more  IACR 2011»
13 years 9 months ago
Wild McEliece Incognito
The wild McEliece cryptosystem uses wild Goppa codes over finite fields to achieve smaller public key sizes compared to the original McEliece cryptosystem at the same level of se...
Daniel J. Bernstein, Tanja Lange, Christiane Peter...