Sciweavers

247 search results - page 38 / 50
» On Pseudorandom Generators in NC
Sort
View
SOUPS
2009
ACM
14 years 2 months ago
Games for extracting randomness
Randomness is a necessary ingredient in various computational tasks and especially in Cryptography, yet many existing mechanisms for obtaining randomness suffer from numerous pro...
Ran Halprin, Moni Naor
GECCO
2003
Springer
128views Optimization» more  GECCO 2003»
14 years 21 days ago
Cellular Programming and Symmetric Key Cryptography Systems
Abstract. The problem of designing symmetric key cryptography algorithms based upon cellular automata (CAs) is considered. The reliability of the Vernam cipher used in the process ...
Franciszek Seredynski, Pascal Bouvry, Albert Y. Zo...
ITC
2000
IEEE
84views Hardware» more  ITC 2000»
13 years 11 months ago
Non-intrusive BIST for systems-on-a-chip
1 The term "functional BIST" describes a test method to control functional modules so that they generate a deterministic test set, which targets structural faults within ...
Silvia Chiusano, Paolo Prinetto, Hans-Joachim Wund...
DCC
1994
IEEE
13 years 11 months ago
Explicit Bit Minimization for Motion-Compensated Video Coding
abstract Dzung T. Hoang Philip M. Longy Je rey Scott Vitterz Department of Computer Science Duke University Box 90129 Durham, NC 27708 0129 We compare methods for choosing motion ...
Dzung T. Hoang, Philip M. Long, Jeffrey Scott Vitt...
IWCMC
2010
ACM
13 years 9 months ago
Joint network coding and beamforming techniques for downlink channels
We propose a joint optimization of Network Coding and MIMO techniques to improve the downlink channel throughput of a wireless base station. Specifically, we consider a MIMO base...
Monchai Lertsutthiwong, Thinh Nguyen, Bechir Hamda...