Sciweavers

321 search results - page 31 / 65
» Randomness extractors -- applications and constructions
Sort
View
SAC
2010
ACM
14 years 3 months ago
Spanders: distributed spanning expanders
We consider self-stabilizing and self-organizing distributed construction of a spanner that forms an expander. The following results are presented. • A randomized technique to r...
Shlomi Dolev, Nir Tzachar
ICCAD
2004
IEEE
151views Hardware» more  ICCAD 2004»
14 years 5 months ago
Dynamic range estimation for nonlinear systems
It has been widely recognized that the dynamic range information of an application can be exploited to reduce the datapath bitwidth of either processors or ASICs, and therefore th...
Bin Wu, Jianwen Zhu, Farid N. Najm
SACRYPT
2004
Springer
125views Cryptology» more  SACRYPT 2004»
14 years 1 months ago
Password Based Key Exchange with Mutual Authentication
A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [18] and later by Gennaro and Li...
Shaoquan Jiang, Guang Gong
TIT
2010
96views Education» more  TIT 2010»
13 years 3 months ago
Beyond Nyquist: efficient sampling of sparse bandlimited signals
Wideband analog signals push contemporary analog-to-digital conversion systems to their performance limits. In many applications, however, sampling at the Nyquist rate is inefficie...
Joel A. Tropp, Jason N. Laska, Marco F. Duarte, Ju...
APPROX
2004
Springer
121views Algorithms» more  APPROX 2004»
14 years 1 months ago
Small Pseudo-random Families of Matrices: Derandomizing Approximate Quantum Encryption
A quantum encryption scheme (also called private quantum channel, or state randomization protocol) is a one-time pad for quantum messages. If two parties share a classical random s...
Andris Ambainis, Adam Smith