Sciweavers

2081 search results - page 85 / 417
» codes 2006
Sort
View
KBSE
2006
IEEE
15 years 5 months ago
Identifying Refactorings from Source-Code Changes
Software has been and is still mostly refactored without tool support. Moreover, as we found in our case studies, programmers tend not to document these changes as refactorings, o...
Peter Weißgerber, Stephan Diehl
EUROCRYPT
2006
Springer
15 years 3 months ago
The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
We show that, in the ideal-cipher model, triple encryption (the cascade of three independently-keyed blockciphers) is more secure than single or double encryption, thereby resolvin...
Mihir Bellare, Phillip Rogaway
CORR
2006
Springer
66views Education» more  CORR 2006»
14 years 12 months ago
Coding into a source: a direct inverse Rate-Distortion theorem
Shannon proved that if we can transmit bits reliably at rates larger than the rate distortion function R(D), then we can transmit this source to within a distortion D. We answer th...
Mukul Agarwal, Anant Sahai, Sanjoy K. Mitter
JSAC
2006
100views more  JSAC 2006»
14 years 11 months ago
Analysis and optimization of CDMA systems with chip-level interleavers
Abstract--In this paper, we present an unequal power allocation technique to increase the throughput of code-division multiple-access (CDMA) systems with chip-level interleavers. P...
Lihai Liu, Jun Tong, Li Ping
GLOBECOM
2006
IEEE
15 years 6 months ago
Cyclic Codes Tailored to a Known Set of Error Patterns
— We propose a high-rate error-pattern control code based on a generator polynomial targeting a specific set of known dominant error patterns. This code is based on first const...
Jihoon Park, Jaekyun Moon