Sciweavers

3379 search results - page 388 / 676
» Powers of Two
Sort
View
STOC
2003
ACM
142views Algorithms» more  STOC 2003»
16 years 4 months ago
Optimal probabilistic fingerprint codes
We construct binary codes for fingerprinting. Our codes for n users that are -secure against c pirates have length O(c2 log(n/ )). This improves the codes proposed by Boneh and Sh...
Gábor Tardos
ICC
2007
IEEE
121views Communications» more  ICC 2007»
15 years 10 months ago
Alternative Symbol Representations with Radial Symmetry for PAPR Reduction in OFDM Systems
— This paper proposes a new method for peak to average power ratio (PAPR) reduction in orthogonal frequency division multiplexing (OFDM) systems using two alternative signalling ...
Ali Al-Shaikhi, Jacek Ilow
GPCE
2007
Springer
15 years 10 months ago
Debugging macros
Over the past two decades, Scheme macros have evolved into a powerful API for the compiler front-end. Like Lisp macros, their predecessors, Scheme macros expand source programs in...
Ryan Culpepper, Matthias Felleisen
132
Voted
IPPS
2002
IEEE
15 years 9 months ago
Massively Parallel Solutions for Molecular Sequence Analysis
In this paper we present new approaches to high performance protein database scanning on two novel massively parallel architectures to gain supercomputer power at low cost. The ï¬...
Bertil Schmidt, Heiko Schröder, Manfred Schim...
ICDCN
2010
Springer
15 years 8 months ago
On Communication Complexity of Secure Message Transmission in Directed Networks
Abstract. We re-visit the problem of perfectly secure message transmission (PSMT) in a directed network under the presence of a threshold adaptive Byzantine adversary, having unbou...
Arpita Patra, Ashish Choudhary, C. Pandu Rangan