Sciweavers

CORR
2011
Springer
188views Education» more  CORR 2011»
13 years 3 months ago
On the Decoding Complexity of Cyclic Codes Up to the BCH Bound
—The standard algebraic decoding algorithm of cyclic codes [n, k, d] up to the BCH bound t is very efficient and practical for relatively small n while it becomes unpractical fo...
Davide Schipani, Michele Elia, Joachim Rosenthal
CORR
2011
Springer
176views Education» more  CORR 2011»
13 years 3 months ago
Decoding by Embedding: Correct Decoding Radius and DMT Optimality
—In lattice-coded multiple-input multiple-output (MIMO) systems, optimal decoding amounts to solving the closest vector problem (CVP). Embedding is a powerful technique for the a...
Cong Ling, Shuiyin Liu, Laura Luzzi, Damien Stehl&...
CORR
2011
Springer
116views Education» more  CORR 2011»
13 years 3 months ago
Spatially Coupled Codes over the Multiple Access Channel
Shrinivas Kudekar, Kenta Kasai
CORR
2011
Springer
162views Education» more  CORR 2011»
13 years 3 months ago
Finitely generated free Heyting algebras via Birkhoff duality and coalgebra
Algebras axiomatized entirely by rank 1 axioms are algebras for a functor and thus the free algebras can be obtained by a direct limit process. Dually, the final coalgebras can be...
Nick Bezhanishvili, Mai Gehrke
CORR
2011
Springer
202views Education» more  CORR 2011»
13 years 3 months ago
Online Least Squares Estimation with Self-Normalized Processes: An Application to Bandit Problems
The analysis of online least squares estimation is at the heart of many stochastic sequential decision-making problems. We employ tools from the self-normalized processes to provi...
Yasin Abbasi-Yadkori, Dávid Pál, Csa...
CORR
2011
Springer
175views Education» more  CORR 2011»
13 years 3 months ago
The Dispersion of Lossy Source Coding
In this work we investigate the behavior of the minimal rate needed in order to guarantee a given probability that the distortion exceeds a prescribed threshold, at some fixed ...
Amir Ingber, Yuval Kochman
CORR
2011
Springer
186views Education» more  CORR 2011»
13 years 3 months ago
Key Reduction of McEliece's Cryptosystem Using List Decoding
Different variants of the code-based McEliece cryptosystem were proposed to reduce the size of the public key. All these variants use very structured codes, which open the door t...
Morgan Barbier
CORR
2011
Springer
159views Education» more  CORR 2011»
13 years 3 months ago
Multicriteria Steiner Tree Problem for Communication Network
Abstract—This paper addresses combinatorial optimization schemes for solving the multicriteria Steiner tree problem for communication network topology design (e.g., wireless mesh...
Mark Sh. Levin, Rustem I. Nuriakhmetov
CORR
2011
Springer
142views Education» more  CORR 2011»
13 years 3 months ago
A Logical Method for Policy Enforcement over Evolving Audit Logs
We present an iterative algorithm for enforcing policies represented in a first-order logic, which can, in particular, express all transmission-related clauses in the HIPAA Priva...
Deepak Garg, Limin Jia, Anupam Datta
CORR
2011
Springer
148views Education» more  CORR 2011»
13 years 3 months ago
Universal Learning Theory
Marcus Hutter