Sciweavers

2572 search results - page 212 / 515
» codes 2008
Sort
View
DM
2007
74views more  DM 2007»
15 years 4 months ago
Parameters for which the Griesmer bound is not sharp
7 We prove for a large class of parameters t and r that a multiset of at most t d−k + r d−k−2 points in PG(d, q) that blocks every k-dimensional subspace at least t times mu...
Andreas Klein, Klaus Metsch
TIT
2008
84views more  TIT 2008»
15 years 4 months ago
Information Theoretic Bounds on Authentication Systems in Query Model
Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric key setting. Information theoretic bounds on the success probability...
Reihaneh Safavi-Naini, Peter R. Wild
TJS
2008
115views more  TJS 2008»
15 years 4 months ago
Insight into redundancy schemes in DHTs
In order to provide high data availability in peer-to-peer (P2P) DHTs, proper data redundancy schemes are required. This paper compares two popular schemes: replication and erasure...
Guihai Chen, Tongqing Qiu, Fan Wu
TCSV
2002
114views more  TCSV 2002»
15 years 4 months ago
Multicast and unicast real-time video streaming over wireless LANs
In this paper, we address the problem of real-time video streaming over wireless LANs for both unicast and multicast transmission. The wireless channel is modeled as a packet-erasu...
Abhik Majumdar, Daniel Grobe Sachs, Igor Kozintsev...
119
Voted
TVLSI
2002
102views more  TVLSI 2002»
15 years 4 months ago
Power-optimal encoding for a DRAM address bus
This paper presents an irredundant encoding technique to minimize the switching activity on a multiplexed Dynamic RAM (DRAM) address bus. The DRAM switching activity can be classif...
Wei-Chung Cheng, Massoud Pedram