Sciweavers

3143 search results - page 263 / 629
» Minimization of entropy functionals
Sort
View
ICC
2009
IEEE
155views Communications» more  ICC 2009»
15 years 2 months ago
On Hashing with Tweakable Ciphers
Cryptographic hash functions are often built on block ciphers in order to reduce the security of the hash to that of the cipher, and to minimize the hardware size. Proven secure co...
Raphael Chung-Wei Phan, Jean-Philippe Aumasson
151
Voted
JMLR
2010
161views more  JMLR 2010»
14 years 11 months ago
Dual Averaging Methods for Regularized Stochastic Learning and Online Optimization
We consider regularized stochastic learning and online optimization problems, where the objective function is the sum of two convex terms: one is the loss function of the learning...
Lin Xiao
TIT
2010
140views Education» more  TIT 2010»
14 years 11 months ago
On the analytic wavelet transform
An exact and general expression for the analytic wavelet transform of a real-valued signal is constructed, resolving the time-dependent effects of non-negligible amplitude and fre...
Jonathan M. Lilly, Sofia C. Olhede
TWC
2010
14 years 11 months ago
Optimal Linear Non-Regenerative Multi-Hop MIMO Relays with MMSE-DFE Receiver at the Destination
In this paper, we study multi-hop non-regenerative multiple-input multiple-output (MIMO) relay communications with any number of hops. We design the optimal source precoding matrix...
Yue Rong
163
Voted
CORR
2011
Springer
210views Education» more  CORR 2011»
14 years 8 months ago
Blind source separation of convolutive mixtures of non circular linearly modulated signals with unknown baud rates
This paper is devoted to the blind separation of convolutive mixtures of possibly non circular linearly modulated signals with unknown (and possibly different) baud rates and carr...
E. Florian, Antoine Chevreuil, Philippe Loubaton