Sciweavers

6404 search results - page 1103 / 1281
» Blocks
Sort
View
TCOS
2010
13 years 4 months ago
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
Willi Geiselmann, Kenneth Matheis, Rainer Steinwan...
TEC
2010
120views more  TEC 2010»
13 years 4 months ago
Benefits of a Population: Five Mechanisms That Advantage Population-Based Algorithms
This paper identifies five distinct mechanisms by which a population-based algorithm might have an advantage over a solo-search algorithm in classical optimization. These mechanism...
Adam Prügel-Bennett
TIFS
2010
227views more  TIFS 2010»
13 years 4 months ago
Region Duplication Detection Using Image Feature Matching
Abstract--Region duplication is a simple and effective operation to create digital image forgeries, where a continuous portion of pixels in an image, after possible geometrical and...
Xunyu Pan, Siwei Lyu
TIT
2010
101views Education» more  TIT 2010»
13 years 4 months ago
Wideband fading channel capacity with training and partial feedback
We consider the capacity of a wideband fading channel with partial feedback, subject to an average power constraint. A doubly block Rayleigh fading model is assumed with finite co...
Manish Agarwal, Michael L. Honig
TIT
2010
129views Education» more  TIT 2010»
13 years 4 months ago
Channel-optimized quantum error correction
We develop a theory for finding quantum error correction (QEC) procedures which are optimized for given noise channels. Our theory accounts for uncertainties in the noise channel, ...
Soraya Taghavi, Robert L. Kosut, Daniel A. Lidar
« Prev « First page 1103 / 1281 Last » Next »