Sciweavers

195 search results - page 21 / 39
» Perfect Byte-Correcting Codes
Sort
View
118
Voted
SIPS
2007
IEEE
15 years 9 months ago
SVD-Aided, Iteratively Detected Spatial Division Multiplexing Using Long-Range Channel Prediction
In this contribution iteratively detected spatial division multiplexing is investigated under the constraint of a fixed data throughput. Existing bit loading and transmit power a...
Andreas Ahrens, Wei Liu, Soon Xin Ng, Volker K&uum...
IPPS
2002
IEEE
15 years 7 months ago
Generalized Multipartitioning for Multi-Dimensional Arrays
Multipartitioning is a strategy for parallelizing computations that require solving 1D recurrences along each dimension of a multi-dimensional array. Previous techniques for multi...
Daniel G. Chavarría-Miranda, Alain Darte, R...
116
Voted
CISS
2007
IEEE
15 years 9 months ago
Correlated Sources over an Asymmetric Multiple Access Channel with One Distortion Criterion
Abstract— We consider transmission of two arbitrarily correlated sources over a discrete memoryless asymmetric multiple access channel, where one of the sources is available at b...
Deniz Gündüz, Elza Erkip
111
Voted
CHES
2007
Springer
173views Cryptology» more  CHES 2007»
15 years 8 months ago
Collision Attacks on AES-Based MAC: Alpha-MAC
Message Authentication Code construction Alred and its AES-based instance Alpha-MAC were introduced by Daemen and Rijmen in 2005. We show that under certain assumptions about its i...
Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovic...
131
Voted
ESAS
2007
Springer
15 years 8 months ago
Distance Bounding in Noisy Environments
Location information can be used to enhance mutual entity authentication protocols in wireless ad-hoc networks. More specifically, distance bounding protocols have been introduced...
Dave Singelée, Bart Preneel