Sciweavers

462 search results - page 38 / 93
» Maximal AMDS codes
Sort
View
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
11 years 10 months ago
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Abstract. An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and ...
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Ka...
ISITA
2010
13 years 5 months ago
Outage analysis and optimal power allocation for network-coding-based hybrid AF and DF
Network coding was proposed to increase the achievable throughput of multicast in a network. Recently, combining network coding into user cooperation has attracted research attenti...
Jooha Bek, Jaeyoung Lee, Jun Heo
INFOCOM
2006
IEEE
14 years 1 months ago
Optimal Power Allocation in Wireless Networks with Transmitter-Receiver Power Tradeoffs
— For many wireless communication links, such as those employing turbo codes or sequentially-decoded convolutional codes, the power consumption of the decoder at the receiver dep...
Sudarshan Vasudevan, Chun Zhang, Dennis Goeckel, D...
CODES
2001
IEEE
13 years 11 months ago
Retargetable compilation for low power
Most research to date on energy minimization in DSP processors has focuses on hardware solution. This paper examines the software-based factors affecting performance and energy co...
Wen-Tsong Shiue
ESANN
2007
13 years 9 months ago
Adaptive Global Metamodeling with Neural Networks
Due to the scale and computational complexity of current simulation codes, metamodels (or surrogate models) have become indispensable tools for exploring and understanding the desi...
Dirk Gorissen, Wouter Hendrickx, Tom Dhaene