Sciweavers

3898 search results - page 44 / 780
» On the Bit Extraction Problem
Sort
View
ICASSP
2008
IEEE
15 years 4 months ago
Iterative R-D optimization of H.264
In this paper, we apply the primal-dual decomposition and subgradient projection methods to solve the rate-distortion optimization problem with the constant bit rate constraint. T...
Cheolhong An, Truong Q. Nguyen
ICC
2009
IEEE
110views Communications» more  ICC 2009»
15 years 4 months ago
Delay Constrained Scheduling over Fading Channels: Optimal Policies for Monomial Energy-Cost Functions
— A point-to-point discrete-time scheduling problem of transmitting B information bits within T hard delay deadline slots is considered assuming that the underlying energy-bit co...
Juyul Lee, Nihar Jindal
FOCS
2008
IEEE
15 years 4 months ago
Kakeya Sets, New Mergers and Old Extractors
A merger is a probabilistic procedure which extracts the randomness out of any (arbitrarily correlated) set of random variables, as long as one of them is uniform. Our main result...
Zeev Dvir, Avi Wigderson
ASIACRYPT
2011
Springer
13 years 9 months ago
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy
A cryptographic assumption is the (unproven) mathematical statement that a certain computational problem (e.g. factoring integers) is computationally hard. The leakage-resilience l...
Divesh Aggarwal, Ueli Maurer
CORR
2007
Springer
127views Education» more  CORR 2007»
14 years 9 months ago
Using decision problems in public key cryptography
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by no...
Vladimir Shpilrain, Gabriel Zapata