Sciweavers

20175 search results - page 3838 / 4035
» Is abstraction the key to computing
Sort
View
TIT
2010
130views Education» more  TIT 2010»
14 years 7 months ago
Pseudo-random functions and parallelizable modes of operations of a block cipher
This paper considers the construction and analysis of pseudo-random functions (PRFs) with specific reference to modes of operations of a block cipher. In the context of message aut...
Palash Sarkar
115
Voted
TVLSI
2010
14 years 7 months ago
Improving Multi-Level NAND Flash Memory Storage Reliability Using Concatenated BCH-TCM Coding
By storing more than one bit in each memory cell, multi-level per cell (MLC) NAND flash memories are dominating global flash memory market due to their appealing storage density ad...
Shu Li, Tong Zhang
107
Voted
CORR
2011
Springer
143views Education» more  CORR 2011»
14 years 4 months ago
Non-malleable extractors via character sums
In studying how to communicate over a public channel with an active adversary, Dodis and Wichs introduced the notion of a non-malleable extractor. A non-malleable extractor dramat...
Trevor D. Wooley, David Zuckerman
CORR
2011
Springer
161views Education» more  CORR 2011»
14 years 4 months ago
Quadratic Goldreich-Levin Theorems
Decomposition theorems in classical Fourier analysis enable us to express a bounded function in terms of few linear phases with large Fourier coefficients plus a part that is pseu...
Madhur Tulsiani, Julia Wolf
109
Voted
CORR
2011
Springer
160views Education» more  CORR 2011»
14 years 4 months ago
Fundamentals of Inter-cell Overhead Signaling in Heterogeneous Cellular Networks
Heterogeneous base stations (e.g. picocells, microcells, femtocells and distributed antennas) will become increasingly essential for cellular network capacity and coverage. Up unt...
Ping Xia, Han-Shin Jo, Jeffrey G. Andrews
« Prev « First page 3838 / 4035 Last » Next »