Sciweavers

1282 search results - page 5 / 257
» Practical Loss-Resilient Codes
Sort
View
68
Voted
MOBILIGHT
2010
14 years 7 months ago
Robust Wireless Network Coding - An Overview
Network Coding (NC) has witnessed a tremendous upsurge in interest and activities in recent years, both in academia and industry. Indeed, since the pioneering publication of Ahlswe...
Marco Di Renzo, Lana Iwaza, Michel Kieffer, Pierre...
JOC
2000
78views more  JOC 2000»
14 years 9 months ago
Practical Aspects of Quantum Cryptographic Key Distribution
Abstract. Performance of various experimental realizations of quantum cryptographic protocols using polarization or phase coding are compared, including a new self-balanced interfe...
Hugo Zbinden, Nicolas Gisin, B. Huttner, A. Muller...
104
Voted
PQCRYPTO
2010
176views Cryptology» more  PQCRYPTO 2010»
14 years 8 months ago
Practical Power Analysis Attacks on Software Implementations of McEliece
The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptograph...
Stefan Heyse, Amir Moradi, Christof Paar
TCOM
2010
85views more  TCOM 2010»
14 years 4 months ago
Achieving the rate-distortion bound with low-density generator matrix codes
It is shown that binary low-density generator matrix codes can achieve the rate-distortion bound of discrete memoryless sources with general distortion measure via multilevel quant...
Zhibin Sun, Mingkai Shao, Jun Chen, Kon Max Wong, ...
138
Voted
ICSE
2012
IEEE-ACM
12 years 12 months ago
Characterizing logging practices in open-source software
—Software logging is a conventional programming practice. While its efficacy is often important for users and developers to understand what have happened in the production run, ...
Ding Yuan, Soyeon Park, Yuanyuan Zhou