Sciweavers

2081 search results - page 182 / 417
» codes 2006
Sort
View
EUROCRYPT
2008
Springer
15 years 1 months ago
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
In the model of perfectly secure message transmission schemes (PSMTs), there are n channels between a sender and a receiver. An infinitely powerful adversary A may corrupt (observe...
Kaoru Kurosawa, Kazuhiro Suzuki
CEE
2007
67views more  CEE 2007»
14 years 11 months ago
Turbo equalization for block fading MIMO channels using random signal mapping
We present a novel turbo equalization scheme for block fading MIMO channels, where diversity is achieved using random signal mapping. We show that the computational complexity of ...
Richard Demo Souza, Javier Garcia-Frias, Renato da...
97
Voted
JSA
2007
84views more  JSA 2007»
14 years 11 months ago
Optimizing data structures at the modeling level in embedded multimedia
Traditional design techniques for embedded systems apply transformations on the source code to optimize hardwarerelated cost factors. Unfortunately, such transformations cannot ad...
Marijn Temmerman, Edgar G. Daylight, Francky Catth...
102
Voted
IJWET
2008
75views more  IJWET 2008»
14 years 10 months ago
Semantic model-driven development of web service architectures
: Building service-based architectures has become a major area of interest since the advent of web services. Modelling these architectures is a central activity. Model-driven devel...
Claus Pahl
77
Voted
ICFP
2006
ACM
15 years 11 months ago
A technique for generic iteration and its optimization
Software libraries rely increasingly on iterators to provide generic traversal of data structures. These iterators can be represented either as objects that maintain state or as p...
Stephen M. Watt