Sciweavers

1201 search results - page 146 / 241
» Exact Analysis of Exact Change
Sort
View
ACNS
2011
Springer
254views Cryptology» more  ACNS 2011»
13 years 1 months ago
Linear Analysis of Reduced-Round CubeHash
Abstract. Recent developments in the field of cryptanalysis of hash functions has inspired NIST to announce a competition for selecting a new cryptographic hash function to join t...
Tomer Ashur, Orr Dunkelman
ICC
2008
IEEE
106views Communications» more  ICC 2008»
14 years 4 months ago
Performance Evaluation of BICM-OFDM Systems Impaired by UWB Interference
— In this paper, we propose a theoretical framework for the analysis of the impact of ultra–wideband (UWB) interference on systems that use the popular combination of bit– in...
Amir Nasri, Robert Schober, Lutz H.-J. Lampe
INFOCOM
2007
IEEE
14 years 4 months ago
Paradox of Shortest Path Routing for Large Multi-Hop Wireless Networks
— In this paper, we analyze the impact of straight line routing in large homogeneous multi-hop wireless networks. We estimate the nodal load, which is defined as the number of p...
Sungoh Kwon, Ness B. Shroff
VTC
2006
IEEE
114views Communications» more  VTC 2006»
14 years 4 months ago
Channel Capacity of BLAST based on the Zero-Forcing criterion
In this paper, we present an asymptotical analysis of channel capacity of Bell labs layered space-time (BLAST) architectures based on a zero-forcing (ZF) criterion in the sense of...
Heunchul Lee, Inkyu Lee
GECCO
2005
Springer
108views Optimization» more  GECCO 2005»
14 years 3 months ago
Some theoretical results about the computation time of evolutionary algorithms
This paper focuses on the computation time of evolutionary algorithms. First, some exact expressions of the mean first hitting times of general evolutionary algorithms in finite...
Lixin X. Ding, Jinghu Yu