Sciweavers

3898 search results - page 351 / 780
» On the Bit Extraction Problem
Sort
View
TALG
2008
124views more  TALG 2008»
15 years 4 months ago
Uniform deterministic dictionaries
Abstract. We present a new analysis of the well-known family of multiplicative hash functions, and improved deterministic algorithms for selecting "good" hash functions. ...
Milan Ruzic
TIT
2008
87views more  TIT 2008»
15 years 4 months ago
Coding Theorems on the Threshold Scheme for a General Source
In this paper, coding theorems on the (t; m)-threshold scheme for a general source are discussed, where m means the number of the shares and t means a threshold. The (t; m)-thresho...
Hiroki Koga
106
Voted
JSAC
2007
72views more  JSAC 2007»
15 years 4 months ago
Diverse: application-layer service differentiation in peer-to-peer communications
— The peer-to-peer communication paradigm, when used to disseminate bulk content or to stream real-time multimedia, has enjoyed the distinct advantage of scalability when compare...
Chuan Wu, Baochun Li
TWC
2008
150views more  TWC 2008»
15 years 4 months ago
Design and analysis of post-coded OFDM systems
This paper discusses the design and analysis of post coded OFDM (PC-OFDM) systems. Coded or precoded OFDM systems are generally employed to overcome the symbol recovery problem in...
S. F. A. Shah, Ahmed H. Tewfik
TWC
2008
120views more  TWC 2008»
15 years 4 months ago
Energy minimization of a QAM system with fading
In this paper, the problem of choosing constellation size and transmit power that minimizes the energy-per-goodbit in a frequency-flat, long-term static fading channel is considere...
Raghavendra S. Prabhu, Babak Daneshrad