Sciweavers

179 search results - page 25 / 36
» On Perfect Codes and Related Concepts
Sort
View
FOCS
2009
IEEE
15 years 4 months ago
Extracting Correlations
Abstract— Motivated by applications in cryptography, we consider a generalization of randomness extraction and the related notion of privacy amplification to the case of two cor...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
EUSFLAT
2003
131views Fuzzy Logic» more  EUSFLAT 2003»
14 years 11 months ago
From communication networks to fuzzy sets
In 1931 and 1935, Ernst Adolph Guillemin, professor of electrical engineering at Masachusetts Institute of Technology (MIT), published the two volumes of his book “Communication...
Rudolf Seising
ICC
2007
IEEE
146views Communications» more  ICC 2007»
15 years 4 months ago
Correlation Based Rate Adaptation via Insights from Incomplete Observations in 802.11 Networks
—Rate adaptation, as a challenging issue for wireless purpose. Relatively little attention has been paid on identifying network design, has been an active research topic for year...
Xia Zhou, Jun Zhao, Guang-Hua Yang
IEEEPACT
2006
IEEE
15 years 3 months ago
An empirical evaluation of chains of recurrences for array dependence testing
Code restructuring compilers rely heavily on program analysis techniques to automatically detect data dependences between program statements. Dependences between statement instanc...
Johnnie Birch, Robert A. van Engelen, Kyle A. Gall...
LOGCOM
2010
154views more  LOGCOM 2010»
14 years 4 months ago
Collaborative Runtime Verification with Tracematches
Perfect pre-deployment test coverage is notoriously difficult to achieve for large applications. Given enough end users, however, many more test cases will be encountered during a...
Eric Bodden, Laurie J. Hendren, Patrick Lam, Ondre...