Sciweavers

677 search results - page 79 / 136
» On the reconstruction of perfect codes
Sort
View
TIT
2002
91views more  TIT 2002»
14 years 9 months ago
On limited-delay lossy coding and filtering of individual sequences
Abstract--We continue the study of adaptive schemes for the sequential lossy coding of individual sequences which was recently initiated by Linder and Lugosi. Specifically, we cons...
Tsachy Weissman, Neri Merhav
TIP
2002
114views more  TIP 2002»
14 years 9 months ago
Lossy to lossless object-based coding of 3-D MRI data
Abstract--We propose a fully three-dimensional (3-D) object-based coding system exploiting the diagnostic relevance of the different regions of the volumetric data for rate allocat...
Gloria Menegaz, Jean-Philippe Thiran
CISS
2007
IEEE
15 years 4 months ago
Correlated Sources over an Asymmetric Multiple Access Channel with One Distortion Criterion
Abstract— We consider transmission of two arbitrarily correlated sources over a discrete memoryless asymmetric multiple access channel, where one of the sources is available at b...
Deniz Gündüz, Elza Erkip
CHES
2007
Springer
173views Cryptology» more  CHES 2007»
15 years 4 months ago
Collision Attacks on AES-Based MAC: Alpha-MAC
Message Authentication Code construction Alred and its AES-based instance Alpha-MAC were introduced by Daemen and Rijmen in 2005. We show that under certain assumptions about its i...
Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovic...
ESAS
2007
Springer
15 years 4 months ago
Distance Bounding in Noisy Environments
Location information can be used to enhance mutual entity authentication protocols in wireless ad-hoc networks. More specifically, distance bounding protocols have been introduced...
Dave Singelée, Bart Preneel