Sciweavers

539 search results - page 64 / 108
» Recurrence relations and fast algorithms
Sort
View
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
15 years 6 months ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay
89
Voted
FAST
2007
15 years 2 months ago
AMP: Adaptive Multi-stream Prefetching in a Shared Cache
Abstract— Prefetching is a widely used technique in modern data storage systems. We study the most widely used class of prefetching algorithms known as sequential prefetching. Th...
Binny S. Gill, Luis Angel D. Bathen
67
Voted
JMM2
2007
59views more  JMM2 2007»
15 years 12 days ago
Single-Ended Quality Measurement of Noise Suppressed Speech Based on Kullback-Leibler Distances
— In this paper, a single-ended quality measurement algorithm for noise suppressed speech is described. The proposed algorithm computes fast approximations of KullbackLeibler dis...
Tiago H. Falk, Hua Yuan, Wai-Yip Chan
139
Voted
SECON
2010
IEEE
14 years 10 months ago
Leveraging Cognitive Radios for Effective Communications over Water
Wireless communications over water may suffer from serious multipath fading due to strong specular reflections from conducting water surfaces. Cognitive radios enable dynamic spect...
Jian Tang, Li Zhang, Richard S. Wolff, Weiyi Zhang
ICDE
2008
IEEE
139views Database» more  ICDE 2008»
15 years 7 months ago
Compact Similarity Joins
— Similarity joins have attracted significant interest, with applications in Geographical Information Systems, astronomy, marketing analyzes, and anomaly detection. However, all...
Brent Bryan, Frederick Eberhardt, Christos Falouts...