Abstract. This paper analyses periodic properties of counter assisted stream ciphers. In particular, we analyze constructions where the counter system also has the purpose of provi...
Ove Scavenius, Martin Boesgaard, Thomas Pedersen, ...
This paper presents a method for analyzing the Bit Error Rate of recovered data for PLL-based data recovery systems (DRS) as the PLL comes into lock. This method is based on the a...
This paper describes a case study addressing risk assessment in a hospital unit. The objective was to analyse the impact on collaborative work after the unit changed their installa...
The expected first hitting time is an important issue in theoretical analyses of evolutionary algorithms since it implies the average computational time complexity. In this paper,...
In this paper, we consider the transmission of a Gaussian source over a cooperative relay network, and analyze its end-to-end distortion at high signal-to-noise ratio, in terms of ...