Sciweavers

228 search results - page 35 / 46
» Decoding of Ternary Error Correcting Output Codes
Sort
View
CHES
2011
Springer
240views Cryptology» more  CHES 2011»
12 years 8 months ago
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
A lightweight and secure key storage scheme using silicon Physical Unclonable Functions (PUFs) is described. To derive stable PUF bits from chip manufacturing variations, a lightwe...
Meng-Day (Mandel) Yu, David M'Raïhi, Richard ...
IACR
2011
125views more  IACR 2011»
12 years 7 months ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...
TWC
2008
140views more  TWC 2008»
13 years 7 months ago
Joint Twofold-Iterative Channel Estimation and Multiuser Detection for MIMO-OFDM Systems
This paper presents an iterative receiver for Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) systems over time-variant wireless channels. T...
Pierluigi Salvo Rossi, Rald R. Müller
INFOCOM
2009
IEEE
14 years 2 months ago
Random Linear Network Coding For Time Division Duplexing: When To Stop Talking And Start Listening
—A new random linear network coding scheme for reliable communications for time division duplexing channels is proposed. The setup assumes a packet erasure channel and that nodes...
Daniel Enrique Lucani, Milica Stojanovic, Muriel M...
ICDAR
2009
IEEE
14 years 2 months ago
Shape Encoded Post Processing of Gurmukhi OCR
A post-processor is an integral part of any OCR system. This paper proposes a method for detection and correction of errors in recognition results of handwritten and machine print...
Dharam Veer Sharma, Gurpreet Singh Lehal, Sarita M...