Sciweavers

2945 search results - page 181 / 589
» Noisy Network Coding
Sort
View
FC
2005
Springer
110views Cryptology» more  FC 2005»
15 years 9 months ago
Approximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly s...
Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, ...
135
Voted
CAV
2003
Springer
140views Hardware» more  CAV 2003»
15 years 8 months ago
Certifying Optimality of State Estimation Programs
Abstract. The theme of this paper is certifying software for state estimation of dynamic systems, which is an important problem found in spacecraft, aircraft, geophysical, and in m...
Grigore Rosu, Ram Prasad Venkatesan, Jon Whittle, ...
135
Voted
CORR
2007
Springer
113views Education» more  CORR 2007»
15 years 3 months ago
On the Outage Capacity of a Practical Decoder Using Channel Estimation Accuracy
— The optimal decoder achieving the outage capacity under imperfect channel estimation is investigated. First, by searching into the family of nearest neighbor decoders, which ca...
Pablo Piantanida, Sajad Sadough, Pierre Duhamel
113
Voted
IPPS
1996
IEEE
15 years 7 months ago
Resource Placement in Torus-Based Networks
This paper investigates methods to locate system resources, such as expensive hardware or software modules, to provide the most effective cost / performance tradeoffs in a torus p...
Myung M. Bae, Bella Bose
151
Voted
SIPS
2006
IEEE
15 years 9 months ago
Architecture-Aware LDPC Code Design for Software Defined Radio
Low-Density Parity-Check (LDPC) codes have been adopted in the physical layer of many communication systems because of their superior performance. The direct implementation of the...
Yuming Zhu, Chaitali Chakrabarti