Sciweavers

1220 search results - page 102 / 244
» Restricting grammatical complexity
Sort
View
IMA
2009
Springer
113views Cryptology» more  IMA 2009»
14 years 2 months ago
On Linear Cryptanalysis with Many Linear Approximations
Abstract. In this paper we present a theoretical framework to quantify the information brought by several linear approximations of a blockcipher without putting any restriction on ...
Benoît Gérard, Jean-Pierre Tillich
ICASSP
2008
IEEE
14 years 2 months ago
Parametric estimation of affine deformations of binary images
We consider the problem of planar object registration on binary images where the aligning transformation is restricted to the group of affine transformations. Previous approaches...
Csaba Domokos, Zoltan Kato, Joseph M. Francos
AINA
2007
IEEE
14 years 2 months ago
A Flexible Scheduling Framework for Deeply Embedded Systems
— Typical embedded systems must perform rather complex control and communication tasks with severely restricted computing resources. Due to these contraints most systems are sing...
Karsten Walther, Jörg Nolte
ICC
2007
IEEE
102views Communications» more  ICC 2007»
14 years 2 months ago
Application of Cumulant Method In Performance Evaluation of Turbo-Like Codes
In this article, a new method for performance evaluation of Turbo-like codes is presented. This is based on estimating the Probability Density Function (pdf) of the bit Log-Likelih...
Ali Abedi, Mary E. Thompson, Amir K. Khandani
ISCAS
2007
IEEE
95views Hardware» more  ISCAS 2007»
14 years 2 months ago
A Universal Approach to Developing Fast Algorithm for Simplified Order-16 ICT
—Simplified order-16 Integer Cosine Transform (ICT) has been proved to be an efficient coding tool especially for High-Definition (HD) video coding and is much simpler than ICT a...
Jie Dong, King Ngi Ngan, Chi-Keung Fong, Wai-kuen ...