Sciweavers

397 search results - page 45 / 80
» Overview of LDPC Codes
Sort
View
ISQED
2010
IEEE
156views Hardware» more  ISQED 2010»
15 years 5 months ago
On the design of different concurrent EDC schemes for S-Box and GF(p)
Recent studies have shown that an attacker can retrieve confidential information from cryptographic hardware (e.g. the secret key) by introducing internal faults. A secure and re...
Jimson Mathew, Hafizur Rahaman, Abusaleh M. Jabir,...
129
Voted
CORR
2007
Springer
104views Education» more  CORR 2007»
15 years 3 months ago
Searching for low weight pseudo-codewords
— Belief Propagation (BP) and Linear Programming (LP) decodings of Low Density Parity Check (LDPC) codes are discussed. We summarize results of instanton/pseudo-codeword approach...
Michael Chertkov, Mikhail G. Stepanov
ICB
2009
Springer
183views Biometrics» more  ICB 2009»
15 years 10 months ago
Overview of the Multiple Biometrics Grand Challenge
The goal of the Multiple Biometrics Grand Challenge (MBGC) is to improve the performance of face and iris recognition technology from biometric samples acquired under unconstrained...
P. Jonathon Phillips, Patrick J. Flynn, J. Ross Be...
144
Voted
BMCBI
2010
122views more  BMCBI 2010»
15 years 3 months ago
An overview of the CellML API and its implementation
Background: CellML is an XML based language for representing mathematical models, in a machine-independent form which is suitable for their exchange between different authors, and...
Andrew K. Miller, Justin Marsh, Adam Reeve, Alan G...
127
Voted
ICC
2009
IEEE
176views Communications» more  ICC 2009»
15 years 10 months ago
Error Resilient Non-Asymmetric Slepian-Wolf Coding
Abstract—We consider non-asymmetric distributed source coding (DSC) that achieves any point in the Slepian-Wolf (SW) region. We study the error propagation phenomena and propose ...
Cédric Herzet, Velotiaray Toto-Zarasoa, Ali...