Sciweavers

5100 search results - page 342 / 1020
» The Linear Complexity of a Graph
Sort
View
WCC
2005
Springer
135views Cryptology» more  WCC 2005»
15 years 10 months ago
Open Problems Related to Algebraic Attacks on Stream Ciphers
Abstract. The recently developed algebraic attacks apply to all keystream generators whose internal state is updated by a linear transition function, including LFSR-based generator...
Anne Canteaut
139
Voted
ISIPTA
2003
IEEE
140views Mathematics» more  ISIPTA 2003»
15 years 10 months ago
A Second-Order Uncertainty Model of Independent Random Variables: An Example of the Stress-Strength Reliability
A second-order hierarchical uncertainty model of a system of independent random variables is studied in the paper. It is shown that the complex nonlinear optimization problem for ...
Lev V. Utkin
118
Voted
PG
2003
IEEE
15 years 10 months ago
Butterworth Filtering and Implicit Fairing of Irregular Meshes
In this paper, we propose efficient numerical techniques for Butterworth filtering and implicit fairing of large irregular triangle meshes, where the corresponding filters are ...
Hao Zhang 0002, Eugene Fiume
159
Voted
GLOBECOM
2007
IEEE
15 years 9 months ago
A Spectrally Efficient Transmission Scheme for Half-Duplex Decode-and-Forward Relaying
We propose a spectrally efficient transmission scheme for the half-duplex relay channel. In the proposed scheme, the relay combines N detected r-dimensional symbols and generates M...
Majid Nasiri Khormuji, Erik G. Larsson
COMPGEOM
2005
ACM
15 years 7 months ago
Multi-pass geometric algorithms
We initiate the study of exact geometric algorithms that require limited storage and make only a small number of passes over the input. Fundamental problems such as lowdimensional...
Timothy M. Chan, Eric Y. Chen