TIT
8 years 5 months ago
2016
We consider a single hop wireless X network with K transmitters and J receivers, all with single antenna. Each transmitter conveys for each receiver an independent message. The ch...
TIT
8 years 5 months ago
2016
The main practical limitation of the McEliece public-key encryption scheme is probably the size of its key. A famous trend to overcome this issue is to focus on subclasses of alte...
TIT
8 years 5 months ago
2016
This work builds on the variant of the function field sieve (FFS) algorithm for the medium prime case introduced by Joux and Lercier in 2006. We make several contributions. The ...
TIT
8 years 5 months ago
2016
Recently, it has been shown that incoherence is an unrealistic assumption for compressed sensing when applied to infinite-dimensional inverse problems. Instead, the key property ...
TIT
8 years 5 months ago
2016
Principal component analysis (PCA) aims at estimating the direction of maximal variability of a high-dimensional dataset. A natural question is: does this task become easier, and ...
|