Sciweavers

147 search results - page 29 / 30
» Logarithmic keying
Sort
View
SIAMCOMP
1998
118views more  SIAMCOMP 1998»
13 years 7 months ago
Genericity, Randomness, and Polynomial-Time Approximations
Polynomial-time safe and unsafe approximations for intractable sets were introduced by Meyer and Paterson [Technical Report TM-126, Laboratory for Computer Science, MIT, Cambridge,...
Yongge Wang
SIAMDM
2010
137views more  SIAMDM 2010»
13 years 5 months ago
Repetition Error Correcting Sets: Explicit Constructions and Prefixing Methods
In this paper we study the problem of finding maximally sized subsets of binary strings (codes) of equal length that are immune to a given number r of repetitions, in the sense th...
Lara Dolecek, Venkat Anantharam
ASIACRYPT
2010
Springer
13 years 5 months ago
Lattice-Based Blind Signatures
Blind signatures (BS), introduced by Chaum, have become a cornerstone in privacy-oriented cryptography. Using hard lattice problems, such as the shortest vector problem, as the bas...
Markus Rückert
SIAMMAX
2010
116views more  SIAMMAX 2010»
13 years 2 months ago
Structured Total Maximum Likelihood: An Alternative to Structured Total Least Squares
Abstract. Linear inverse problems with uncertain measurement matrices appear in many different applications. One of the standard techniques for solving such problems is the total l...
Amir Beck, Yonina C. Eldar
TSP
2012
12 years 3 months ago
On the Rate Gap Between Multi- and Single-Cell Processing Under Opportunistic Scheduling
—Base station (BS) coordination is a key technique to handle intercell interference (ICI) in cellular networks. Nevertheless, recent work on scheduling indicates that the value o...
Hans Jørgen Bang, David Gesbert, Pål ...