Sciweavers

193 search results - page 6 / 39
» Key Derivation for Squared-Friendly Applications: Lower Boun...
Sort
View
68
Voted
TIT
2008
90views more  TIT 2008»
14 years 9 months ago
An Improved Sphere-Packing Bound for Finite-Length Codes Over Symmetric Memoryless Channels
This paper derives an improved sphere-packing (ISP) bound for finite-length error-correcting codes whose transmission takes place over symmetric memoryless channels, and the codes...
Gil Wiechman, Igal Sason
CORR
2006
Springer
77views Education» more  CORR 2006»
14 years 9 months ago
Quantization Bounds on Grassmann Manifolds and Applications to MIMO Communications
This paper considers the quantization problem on the Grassmann manifold Gn,p, the set of all p-dimensional planes (through the origin) in the n-dimensional Euclidean space. The ch...
Wei Dai, Youjian Liu, Brian Rider
STOC
1999
ACM
85views Algorithms» more  STOC 1999»
15 years 1 months ago
A Theorem on Sensitivity and Applications in Private Computation
In this paper we prove a theorem that gives an (almost) tight upper bound on the sensitivity of a multiple-output Boolean function in terms of the sensitivity of its coordinates an...
Anna Gál, Adi Rosén
CDC
2009
IEEE
111views Control Systems» more  CDC 2009»
15 years 2 months ago
Restricted real perturbation values with applications to the structured real controllability radius of LTI systems
Abstract— In this paper, the concept of restricted real perturbation values of a complex matrix triplet is introduced, and a formula for computing lower bounds of these values is...
Simon Lam, Edward J. Davison
ALGORITHMICA
2005
108views more  ALGORITHMICA 2005»
14 years 9 months ago
Key-Independent Optimality
A new form of optimality for comparison based static dictionaries is introduced. This type of optimality, keyindependent optimality, is motivated by applications that assign key v...
John Iacono