Sciweavers

3898 search results - page 76 / 780
» On the Bit Extraction Problem
Sort
View
ASIACRYPT
2009
Springer
15 years 11 months ago
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
We demonstrate how the framework that is used for creating efficient number-theoretic ID and signature schemes can be transferred into the setting of lattices. This results in cons...
Vadim Lyubashevsky
ICC
2007
IEEE
164views Communications» more  ICC 2007»
15 years 10 months ago
Communication Limits with Low Precision Analog-to-Digital Conversion at the Receiver
— We examine the Shannon limits of communication systems when the precision of the analog-to-digital conversion (ADC) at the receiver is constrained. ADC is costly and powerhungr...
Jaspreet Singh, Onkar Dabeer, Upamanyu Madhow
GECCO
2004
Springer
104views Optimization» more  GECCO 2004»
15 years 9 months ago
Simultaneity Matrix for Solving Hierarchically Decomposable Functions
The simultaneity matrix is an × matrix of numbers. It is constructed according to a set of -bit solutions. The matrix element mij is the degree of linkage between bit positions i ...
Chatchawit Aporntewan, Prabhas Chongstitvatana
CRYPTO
2003
Springer
187views Cryptology» more  CRYPTO 2003»
15 years 9 months ago
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model
We consider the problem of constructing randomness extractors that are locally computable; that is, read only a small number of bits from their input. As recently shown by Lu (thi...
Salil P. Vadhan
MM
1997
ACM
112views Multimedia» more  MM 1997»
15 years 8 months ago
An Evaluation of VBR Disk Admission Algorithms for Continuous Media File Servers
In this paper, we address the problem of choosing a disk admission algorithm for continuous media streams where each stream may have a di erent bit rate, and more importantly, whe...
Dwight J. Makaroff, Gerald W. Neufeld, Norman C. H...