Sciweavers

454 search results - page 73 / 91
» Distance Education at a Glance
Sort
View
75
Voted
CORR
2004
Springer
114views Education» more  CORR 2004»
14 years 9 months ago
Quantum Communication Cannot Simulate a Public Coin
We study the simultaneous message passing model of communication complexity. Building on the quantum fingerprinting protocol of Buhrman et al., Yao recently showed that a large cl...
Dmitry Gavinsky, Julia Kempe, Ronald de Wolf
CORR
1999
Springer
138views Education» more  CORR 1999»
14 years 9 months ago
A simple proof of the unconditional security of quantum key distribution
Quantum key distribution is the best known application of quantum cryptography. Previously proposed proofs of security of quantum key distribution contain various technical subtle...
Hoi-Kwong Lo
CORR
2008
Springer
117views Education» more  CORR 2008»
14 years 8 months ago
Complexity of Decoding Positive-Rate Reed-Solomon Codes
Abstract. The complexity of maximum likelihood decoding of the ReedSolomon codes [q -1, k]q is a well known open problem. The only known result [4] in this direction states that it...
Qi Cheng, Daqing Wan
CORR
2010
Springer
75views Education» more  CORR 2010»
14 years 8 months ago
Dense Error-Correcting Codes in the Lee Metric
Several new applications and a number of new mathematical techniques have increased the research on errorcorrecting codes in the Lee metric in the last decade. In this work we cons...
Tuvi Etzion, Alexander Vardy, Eitan Yaakobi
91
Voted
CORR
2010
Springer
237views Education» more  CORR 2010»
14 years 7 months ago
Featureless 2D-3D Pose Estimation by Minimising an Illumination-Invariant Loss
The problem of identifying the 3D pose of a known object from a given 2D image has important applications in Computer Vision ranging from robotic vision to image analysis. Our pro...
Srimal Jayawardena, Marcus Hutter, Nathan Brewer