Sciweavers

1431 search results - page 123 / 287
» The complexity of random ordered structures
Sort
View
ICCCN
2007
IEEE
15 years 9 months ago
Interleaving Techniques for W-CDMA Linear Equalization Receivers
—This paper focuses on the use of specific interleaving techniques for use in W-CDMA (Wideband Code Division Multiple Access). The linear equalization algorithm usually performs ...
João Carlos Silva, Rui Dinis, Nuno Souto, F...
ASIACRYPT
2004
Springer
15 years 8 months ago
Generic Homomorphic Undeniable Signatures
We introduce a new computational problem related to the interpolation of group homomorphisms which generalizes many famous cryptographic problems including discrete logarithm, Diï¬...
Jean Monnerat, Serge Vaudenay
ISCAS
2003
IEEE
162views Hardware» more  ISCAS 2003»
15 years 8 months ago
Content based error detection and concealment for image transmission over wireless channel
In this paper, we present a novel content-based image error detection and error concealment algorithm to improve the image quality degraded during its transmission over wireless c...
Shuiming Ye, Xinggang Lin, Qibin Sun
VLDB
1991
ACM
134views Database» more  VLDB 1991»
15 years 6 months ago
Extending the Search Strategy in a Query Optimizer
In order to cope efficiently with simple or complex queries as well as different application requirements (e.g., ad-hoc versus repetitive queries), a query optimizer ought to supp...
Rosana S. G. Lanzelotte, Patrick Valduriez
IACR
2011
116views more  IACR 2011»
14 years 2 months ago
Some Words About Cryptographic Key Recognition In Data Streams
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at...
Alexey Chilikov, Evgeny Alekseev