Sciweavers

694 search results - page 105 / 139
» The Power of the Middle Bit
Sort
View
IPL
2006
141views more  IPL 2006»
13 years 8 months ago
Perfectly Reliable Message Transmission
We study the problem of Perfectly Reliable Message Transmission (PRMT) and Perfectly Secure Message Transmission (PSMT) between two nodes S and R in an undirected synchronous netw...
Arvind Narayanan, K. Srinathan, C. Pandu Rangan
JSAC
2006
180views more  JSAC 2006»
13 years 8 months ago
Adaptive spread-spectrum multicarrier multiple-access over wirelines
Abstract--In this paper, we investigate the dynamic resource allocation adapted to spread-spectrum multicarrier multiple-access (SS-MC-MA) systems in a multiuser power line communi...
Matthieu Crussière, Jean-Yves Baudais, Jean...
TC
2008
13 years 7 months ago
Cryptanalysis with COPACOBANA
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Tim Güneysu, Timo Kasper, Martin Novotn&yacut...
TCSV
2002
108views more  TCSV 2002»
13 years 7 months ago
Pilot-assisted 16-level QAM for wireless video
This paper presents a twin-class transmission system for narrowband radio access channels suitable for handheld video phone and multimedia portable PC applications. The transmissio...
Hamid Gharavi
MAM
2011
349views Communications» more  MAM 2011»
13 years 2 months ago
An iterative logarithmic multiplier
The paper presents a new multiplier enabling achievement of an arbitrary accuracy. It follows the same idea of number representation as the Mitchell’s algorithm, but does not use...
Zdenka Babic, Aleksej Avramovic, Patricio Bulic