Sciweavers

9841 search results - page 163 / 1969
» Distributed Value Functions
Sort
View
CORR
2011
Springer
169views Education» more  CORR 2011»
14 years 9 months ago
A Secure Communication Game with a Relay Helping the Eavesdropper
—In this work a four terminal Gaussian network composed of a source, a destination, an eavesdropper and a jammer relay is studied. The jammer relay does not hear the source trans...
Melda Yuksel, Xi Liu, Elza Erkip
ICASSP
2008
IEEE
15 years 9 months ago
Analytical driving functions for higher order Ambisonics
In this paper, we present the derivation and investigation of analytical expressions for the loudspeaker driving signals for higher order Ambisonics. The approach relies on the as...
Jens Ahrens, Sascha Spors
SETA
2010
Springer
137views Mathematics» more  SETA 2010»
15 years 24 days ago
On a Conjecture about Binary Strings Distribution
It is a difficult challenge to find Boolean functions used in stream ciphers achieving all of the necessary criteria and the research of such functions has taken a significant d...
Jean-Pierre Flori, Hugues Randriam, Gérard ...
ICS
2010
Tsinghua U.
15 years 11 months ago
Non-Malleable Codes
We introduce the notion of "non-malleable codes" which relaxes the notion of error-correction and errordetection. Informally, a code is non-malleable if the message cont...
Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wic...
127
Voted
BMCBI
2006
152views more  BMCBI 2006»
15 years 2 months ago
Predicting deleterious nsSNPs: an analysis of sequence and structural attributes
Background: There has been an explosion in the number of single nucleotide polymorphisms (SNPs) within public databases. In this study we focused on non-synonymous protein coding ...
Richard J. B. Dobson, Patricia B. Munroe, Mark J. ...