Sciweavers

475 search results - page 57 / 95
» Designs in Product Association Schemes
Sort
View
CRYPTO
2004
Springer
123views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
Asymptotically Optimal Communication for Torus-Based Cryptography
Abstract. We introduce a compact and efficient representation of elements of the algebraic torus. This allows us to design a new discretelog based public-key system achieving the o...
Marten van Dijk, David P. Woodruff
ICAD
2004
13 years 9 months ago
Data Set Selection for a Constrained Simple Sonification
Previous work on the production and test of various sonifications has shown that adding a sonification to an interface can assist the execution of a variety of operator tasks [1,2...
Shawn C. Garner
TCOM
2008
119views more  TCOM 2008»
13 years 7 months ago
Maximum likelihood detection for differential unitary space-time modulation with carrier frequency offset
Can conventional differential unitary space time modulation (DUSTM) be applied when there is an unknown carrier frequency offset (CFO)? This paper answers this question affirmative...
Feifei Gao, Tao Cui, Arumugam Nallanathan, Chintha...
PVLDB
2010
151views more  PVLDB 2010»
13 years 6 months ago
Database Compression on Graphics Processors
Query co-processing on graphics processors (GPUs) has become an effective means to improve the performance of main memory databases. However, this co-processing requires the data ...
Wenbin Fang, Bingsheng He, Qiong Luo

Publication
350views
15 years 22 days ago
Programmable Aperture Photography: Multiplexed Light Field Acquisition
In this paper, we present a system including a novel component called programmable aperture and two associated post-processing algorithms for high-quality light field acquisition. ...
Chia-Kai Liang and Tai-Hsu Lin and Bing-Yi Wong a...