Sciweavers

195 search results - page 21 / 39
» Perfect Byte-Correcting Codes
Sort
View
SIPS
2007
IEEE
15 years 6 months ago
SVD-Aided, Iteratively Detected Spatial Division Multiplexing Using Long-Range Channel Prediction
In this contribution iteratively detected spatial division multiplexing is investigated under the constraint of a fixed data throughput. Existing bit loading and transmit power a...
Andreas Ahrens, Wei Liu, Soon Xin Ng, Volker K&uum...
IPPS
2002
IEEE
15 years 4 months ago
Generalized Multipartitioning for Multi-Dimensional Arrays
Multipartitioning is a strategy for parallelizing computations that require solving 1D recurrences along each dimension of a multi-dimensional array. Previous techniques for multi...
Daniel G. Chavarría-Miranda, Alain Darte, R...
CISS
2007
IEEE
15 years 6 months ago
Correlated Sources over an Asymmetric Multiple Access Channel with One Distortion Criterion
Abstract— We consider transmission of two arbitrarily correlated sources over a discrete memoryless asymmetric multiple access channel, where one of the sources is available at b...
Deniz Gündüz, Elza Erkip
CHES
2007
Springer
173views Cryptology» more  CHES 2007»
15 years 6 months ago
Collision Attacks on AES-Based MAC: Alpha-MAC
Message Authentication Code construction Alred and its AES-based instance Alpha-MAC were introduced by Daemen and Rijmen in 2005. We show that under certain assumptions about its i...
Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovic...
ESAS
2007
Springer
15 years 6 months ago
Distance Bounding in Noisy Environments
Location information can be used to enhance mutual entity authentication protocols in wireless ad-hoc networks. More specifically, distance bounding protocols have been introduced...
Dave Singelée, Bart Preneel