Sciweavers

1579 search results - page 14 / 316
» On the Constructions of Constant-Weight Codes
Sort
View
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
13 years 1 days ago
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Abstract. An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and ...
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Ka...
ISITA
2010
14 years 6 months ago
Syndrome former trellis construction for punctured convolutional codes
In this paper syndrome former trellis construction for punctured convolutional codes (PCCs) is discussed. The class of (np - 1)/np-rate PCCs derived from 1/n-rate mother codes is c...
Jan Geldmacher, Jürgen Götze
CORR
2011
Springer
161views Education» more  CORR 2011»
14 years 4 months ago
Generalized Gray Codes for Local Rank Modulation
—We consider the local rank-modulation scheme in which a sliding window going over a sequence of real-valued variables induces a sequence of permutations. Local rankmodulation is...
Eyal En Gad, Michael Langberg, Moshe Schwartz, Jeh...
94
Voted
GIS
2003
ACM
15 years 2 months ago
Construction of the planar partition postal code map based on cadastral reGIStration
Accurate postal code maps have many applications within GIS as the postal code has the potential to link the address description of buildings to their location in a specified glob...
Friso Penninga, Edward Verbree, Wilko Quak, Peter ...