Sciweavers

526 search results - page 86 / 106
» On circularly symmetric functions
Sort
View
APPROX
2009
Springer
135views Algorithms» more  APPROX 2009»
14 years 4 months ago
Tolerant Linearity Testing and Locally Testable Codes
Abstract. We study tolerant linearity testing under general distributions. Given groups G and H, a distribution µ on G, and oracle access to a function f : G → H, we consider th...
Swastik Kopparty, Shubhangi Saraf
IH
2009
Springer
14 years 4 months ago
Estimating the Minimal Length of Tardos Code
Abstract. This paper estimates the minimal length of a binary probabilistic traitor tracing code. We consider the code construction proposed by G. Tardos in 2003, with the symmetri...
Teddy Furon, Luis Pérez-Freire, Arnaud Guya...
CDC
2008
IEEE
153views Control Systems» more  CDC 2008»
14 years 4 months ago
A stackelberg game for pricing uplink power in wide-band cognitive radio networks
— We study the problem of pricing uplink power in wide-band cognitive radio networks under the objective of revenue maximization for the service provider and while ensuring incen...
Ashraf Al Daoud, Tansu Alpcan, Sachin Kumar Agarwa...
WCNC
2008
IEEE
14 years 4 months ago
A Novel Capacity Analysis for Wireless Backhaul Mesh Networks
—This paper presents a novel ring-based approach to analyze the inter-flow capacity of a backhaul wireless mesh networks (WMNs) with centralized scheduling. Based on the property...
Tein-Yaw D. Chung, Kuan-Chun Lee, Hsiao-Chih Georg...
CODES
2007
IEEE
14 years 4 months ago
Secure FPGA circuits using controlled placement and routing
In current Field-Programmable-Logic Architecture (FPGA) design flows, it is very hard to control the routing of submodules. It is thus very hard to make an identical copy of an ex...
Pengyuan Yu, Patrick Schaumont