Sciweavers

526 search results - page 9 / 106
» On circularly symmetric functions
Sort
View
ICASSP
2008
IEEE
15 years 6 months ago
Maximum likelihood binary detection in improper complex gaussian noise
In a wide range of communication systems, including DS-CDMA and OFDM systems, the signal-of-interest might be corrupted by an improper [1] (also called non circularly symmetric [2...
Amirhossein S. Aghaei, Konstantinos N. Plataniotis...
78
Voted
ACISP
1999
Springer
15 years 4 months ago
On the Symmetric Property of Homogeneous Boolean Functions
We use combinatorial methods and permutation groups to classify homogeneous boolean functions. The property of symmetry of a boolean function limits the size of the function’s cl...
Chengxin Qu, Jennifer Seberry, Josef Pieprzyk
DAM
2008
139views more  DAM 2008»
14 years 11 months ago
Covering symmetric semi-monotone functions
We define a new set of functions called semi-monotone, a subclass of skew-supermodular functions. We show that the problem of augmenting a given graph to cover a symmetric semi-mo...
Roland Grappe, Zoltán Szigeti
MOC
1998
62views more  MOC 1998»
14 years 11 months ago
Numerical evaluation of a symmetric potential function
Abstract. We discuss the numerical evaluation of a symmetric potential function which arises naturally in applications. We present a method designed to accurately and efficiently c...
Lori A. Carmack
82
Voted
ITCC
2005
IEEE
15 years 5 months ago
Conversion and Proxy Functions for Symmetric Key Ciphers
As a general design criterion, a symmetric key cipher should not be closed under functional composition due to the implications on the security of the cipher. However, there are s...
Debra L. Cook, Angelos D. Keromytis