Sciweavers

523 search results - page 53 / 105
» codes 2011
Sort
View
CRYPTO
2011
Springer
179views Cryptology» more  CRYPTO 2011»
14 years 11 days ago
Smaller Decoding Exponents: Ball-Collision Decoding
Very few public-key cryptosystems are known that can encrypt and decrypt in time b2+o(1) with conjectured security level 2b against conventional computers and quantum computers. Th...
Daniel J. Bernstein, Tanja Lange, Christiane Peter...
99
Voted
ICC
2011
IEEE
185views Communications» more  ICC 2011»
14 years 5 days ago
An Information-Theoretic Approach to Accelerated Simulation of Hybrid-ARQ Systems
—In order to reduce the long runtimes required to simulate hybrid automatic repeat-request (ARQ) systems, such as high-speed downlink packet access (HSDPA), we propose an informa...
Matthew C. Valenti
104
Voted
CORR
2011
Springer
142views Education» more  CORR 2011»
14 years 4 months ago
On the Locality of Codeword Symbols
Consider a linear [n, k, d]q code C. We say that that i-th coordinate of C has locality r, if the value at this coordinate can be recovered from accessing some other r coordinates...
Parikshit Gopalan, Cheng Huang, Huseyin Simitci, S...
141
Voted
AOSD
2011
ACM
14 years 4 months ago
An aspect-oriented approach for implementing evolutionary computation applications
Object-oriented frameworks support design and code reuse for specific application domains. To facilitate the development of evolutionary computation (EC) programs, such as geneti...
Andres J. Ramirez, Adam C. Jensen, Betty H. C. Che...
SAC
2011
ACM
14 years 3 months ago
Type harvesting: a practical approach to obtaining typing information in dynamic programming languages
Dynamically typed programming languages are powerful tools for rapid software development. However, there are scenarios that would benefit from actual type information being avai...
Michael Haupt, Michael Perscheid, Robert Hirschfel...