Sciweavers

2237 search results - page 79 / 448
» On the Security of Random Sources
Sort
View
TIT
1998
89views more  TIT 1998»
15 years 4 months ago
The Common Randomness Capacity of a Pair of Independent Discrete Memoryless Channels
—We study the following problem: two agents Alice and Bob are connected to each other by independent discrete memoryless channels. They wish to generate common randomness, i.e., ...
Sivarama Venkatesan, Venkat Anantharam
139
Voted
COCO
2007
Springer
96views Algorithms» more  COCO 2007»
15 years 11 months ago
Unbalanced Expanders and Randomness Extractors from Parvaresh-Vardy Codes
We give an improved explicit construction of highly unbalanced bipartite expander graphs with expansion arbitrarily close to the degree (which is polylogarithmic in the number of ...
Venkatesan Guruswami, Christopher Umans, Salil P. ...
ICASSP
2011
IEEE
14 years 8 months ago
Snapshot spectral imaging via compressive random convolution
Spectral imaging is of interest in many applications, including wide-area airborne surveillance, remote sensing, and tissue spectroscopy. Coded aperture spectral snapshot imaging ...
Yao Wu, Gonzalo R. Arce
CSFW
2009
IEEE
15 years 11 months ago
Updatable Security Views
Security views are a flexible and effective mechanism for controlling access to confidential information. Rather than allowing untrusted users to access source data directly, th...
J. Nathan Foster, Benjamin C. Pierce, Steve Zdance...
SECON
2007
IEEE
15 years 11 months ago
Two-hop Relaying in Random Networks with Limited Channel State Information
— In this paper we study two-hop cooperative diversity relaying in random wireless networks. In contrast to most work on cooperative diversity relaying where the relay node posit...
Furuzan Atay Onat, Dan Avidor, Sayandev Mukherjee