Sciweavers

1448 search results - page 36 / 290
» From Requirements to Code Revisited
Sort
View
IJNSEC
2007
122views more  IJNSEC 2007»
14 years 11 months ago
Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings
Deniable authentication protocol is different from traditional authentication protocol in that the intended receiver can authenticate the source of a given message, but cannot pr...
Rongxing Lu, Zhenfu Cao
ICC
2008
IEEE
141views Communications» more  ICC 2008»
15 years 6 months ago
Multilevel Structured Low-Density Parity-Check Codes
— Low-Density Parity-Check (LDPC) codes are typically characterized by a relatively high-complexity description, since a considerable amount of memory is required in order to sto...
Nicholas Bonello, Sheng Chen, Lajos Hanzo
SAIG
2000
Springer
15 years 3 months ago
Generating Data Analysis Programs from Statistical Models
Extracting information from data, often also called data analysis, is an important scienti c task. Statistical approaches, which use methods from probability theory and numerical a...
Bernd Fischer 0002, Johann Schumann, Thomas Pressb...
FOCS
2000
IEEE
15 years 4 months ago
Extracting Randomness from Samplable Distributions
Randomness extractors convert weak sources of randomness into an almost uniform distribution; the conversion uses a small amount of pure randomness. In algorithmic applications, t...
Luca Trevisan, Salil P. Vadhan
TOG
2012
230views Communications» more  TOG 2012»
13 years 2 months ago
Decoupling algorithms from schedules for easy optimization of image processing pipelines
Using existing programming tools, writing high-performance image processing code requires sacrificing readability, portability, and modularity. We argue that this is a consequenc...
Jonathan Ragan-Kelley, Andrew Adams, Sylvain Paris...