Sciweavers

3373 search results - page 345 / 675
» Linear transformations on codes
Sort
View
140
Voted
FDTC
2006
Springer
74views Cryptology» more  FDTC 2006»
15 years 7 months ago
Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection
Traditional hardware error detection methods based on linear codes make assumptions about the typical or expected errors and faults and concentrate the detection power towards the ...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
MEDIAFORENSICS
2010
15 years 5 months ago
Minimizing embedding impact in steganography using trellis-coded quantization
In this paper, we propose a practical approach to minimizing embedding impact in steganography based on syndrome coding and trellis-coded quantization and contrast its performance...
Tomás Filler, Jan Judas, Jessica J. Fridric...
CORR
2008
Springer
87views Education» more  CORR 2008»
15 years 4 months ago
The Rate Loss of Single-Letter Characterization: The "Dirty" Multiple Access Channel
For general memoryless systems, the typical information theoretic solution - when exists - has a "single-letter" form. This reflects the fact that optimum performance ca...
Tal Philosof, Ram Zamir
CORR
2006
Springer
127views Education» more  CORR 2006»
15 years 4 months ago
Guessing Facets: Polytope Structure and Improved LP Decoder
Abstract--We investigate the structure of the polytope underlying the linear programming (LP) decoder introduced by Feldman, Karger, and Wainwright. We first show that for expander...
Alexandros G. Dimakis, Martin J. Wainwright
TWC
2008
101views more  TWC 2008»
15 years 4 months ago
Simplified receiver design for STBC binary continuous phase modulation
Abstract-- Existing space-time codes have focused on multipleantenna systems with linear modulation schemes such as phaseshift keying and quadrature amplitude modulation. Continuou...
L. Xian, R. Punnoose, H. Liu