Sciweavers

DCC
2010
IEEE
13 years 5 months ago
Parameter choices and a better bound on the list size in the Guruswami-Sudan algorithm for algebraic geometry codes
Abstract. Given an algebraic geometry code CL(D, P), the GuruswamiSudan algorithm produces a list of all codewords in CL(D, P) within a specified distance of a received word. The i...
Nathan Drake, Gretchen L. Matthews
DCC
2010
IEEE
13 years 8 months ago
Optimization of Overlapped Tiling for Efficient 3D Image Retrieval
Remote visualization of an arbitrary 2-D planar "cut" from a large volumetric dataset with random access has both gained importance and posed significant challenges over...
Zihong Fan, Antonio Ortega
DCC
2010
IEEE
13 years 9 months ago
Neural Markovian Predictive Compression: An Algorithm for Online Lossless Data Compression
This work proposes a novel practical and general-purpose lossless compression algorithm named Neural Markovian Predictive Compression (NMPC), based on a novel combination of Bayesi...
Erez Shermer, Mireille Avigal, Dana Shapira
DCC
2010
IEEE
13 years 9 months ago
Bidirectional Delta Files
This paper introduces a new method called Bidirectional Delta file, which is to construct a two way delta file out of two given files. Previous work focuses on forwards and back...
Dana Shapira, Michael Kats
DCC
2010
IEEE
13 years 11 months ago
Anonymity in shared symmetric key primitives
We provide a stronger definition of anonymity in the context of shared symmetric key primitives, and show that existing schemes do not provide this level of anonymity. A new schem...
Gregory M. Zaverucha, Douglas R. Stinson
DCC
2010
IEEE
13 years 11 months ago
Minimum distance of Hermitian two-point codes
In [8], the authors formulate new coset bounds for algebraic geometric codes. The bounds give improved lower bounds for the minumum distance of algebraic geometric codes as well a...
Seungkook Park
DCC
2010
IEEE
13 years 11 months ago
The cost of false alarms in Hellman and rainbow tradeoffs
Abstract Cryptanalytic time memory tradeoff algorithms are generic one-way function inversion techniques that utilize pre-computation. Even though the online time complexity is kno...
Jin Hong
DCC
2010
IEEE
13 years 11 months ago
Geometric and design-theoretic aspects of semibent functions I
The two parts of this paper consider combinatorial and geometric aspects of semibent functions. In the first part of this note we obtain 2
Ulrich Dempwolff, Timo Neumann
DCC
2010
IEEE
13 years 11 months ago
On quadratic APN functions and dimensional dual hyperovals
In this paper we characterize the d-dimensional dual hyperovals in PG(2d + 1, 2) that can be obtained by Yoshiara's construction [21] from quadratic APN functions and state a...
Yves Edel
DCC
2010
IEEE
13 years 11 months ago
A tight asymptotic bound on the size of constant-weight conflict-avoiding codes
In the study of multiple-access in the collision channel, conflict-avoiding code is used to guarantee that each transmitting user can send at least one packet successfully in the w...
Kenneth W. Shum, Wing Shing Wong