Sciweavers

1541 search results - page 186 / 309
» Analysis of Random Noise and Random Walk Algorithms
Sort
View
CORR
2007
Springer
74views Education» more  CORR 2007»
13 years 8 months ago
Computing Minimal Polynomials of Matrices
We present and analyse a Monte-Carlo algorithm to compute the minimal polynomial of an n × n matrix over a finite field that requires O(n3 ) field operations and O(n) random v...
Max Neunhöffer, Cheryl E. Praeger
ICC
2007
IEEE
139views Communications» more  ICC 2007»
14 years 2 months ago
Impatient Backoff Algorithm: Fairness in a Distributed Ad-Hoc MAC
— Many distributed multiple access (MAC) protocols use an exponential backoff mechanism. In that mechanism, a node picks a random backoff time uniformly in an interval that doubl...
Rajarshi Gupta, Jean C. Walrand
TWC
2008
126views more  TWC 2008»
13 years 8 months ago
Quadratic forms in normal RVs: theory and applications to OSTBC over hoyt fading channels
In this paper, the statistics of quadratic forms in normal random variables (RVs) are studied and their impact on performance analysis of wireless communication systems is explored...
George A. Ropokis, Athanasios A. Rontogiannis, P. ...
GLVLSI
2010
IEEE
190views VLSI» more  GLVLSI 2010»
13 years 10 months ago
A linear statistical analysis for full-chip leakage power with spatial correlation
In this paper, we present an approved linear-time algorithm for statistical leakage analysis in the present of any spatial correlation condition (strong or weak). The new algorith...
Ruijing Shen, Sheldon X.-D. Tan, Jinjun Xiong
STOC
2005
ACM
150views Algorithms» more  STOC 2005»
14 years 8 months ago
Correcting errors without leaking partial information
This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W. Any bits they communicate must leak ...
Yevgeniy Dodis, Adam Smith