Sciweavers

CORR
2010
Springer
67views Education» more  CORR 2010»
13 years 9 months ago
Secret Sharing LDPC Codes for the Constrained Gaussian Wiretap Channel
The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a destination intend to share secret information over a Gaussian channel in the presenc...
Chan Wong Wong, Tan F. Wong, John M. Shea
TIT
2008
118views more  TIT 2008»
13 years 10 months ago
Discrete-Input Two-Dimensional Gaussian Channels With Memory: Estimation and Information Rates Via Graphical Models and Statisti
Abstract--Discrete-input two-dimensional (2-D) Gaussian channels with memory represent an important class of systems, which appears extensively in communications and storage. In sp...
Ori Shental, Noam Shental, Shlomo Shamai, Ido Kant...
TIT
2008
100views more  TIT 2008»
13 years 11 months ago
Communication Via Decentralized Processing
Abstract-- The common problem of a nomadic terminal sending information to a remote destination via agents with lossless connections is investigated. Such a setting suits, e.g. acc...
Amichai Sanderovich, Shlomo Shamai, Yossef Steinbe...
CORR
2010
Springer
98views Education» more  CORR 2010»
13 years 11 months ago
Analog Matching of Colored Sources to Colored Channels
Analog (uncoded) transmission provides a simple scheme for communicating a Gaussian source over a Gaussian channel under the mean squared error (MSE) distortion measure. Unfortuna...
Yuval Kochman, Ram Zamir
CORR
2010
Springer
111views Education» more  CORR 2010»
13 years 11 months ago
A Tight Bound on the Performance of a Minimal-Delay Joint Source-Channel Coding Scheme
An analog source is to be transmitted across a Gaussian channel in more than one channel use per source symbol. This paper derives a lower bound on the asymptotic mean squared erro...
Marius Kleiner, Bixio Rimoldi
ICASSP
2009
IEEE
14 years 6 months ago
Anti-collusion fingerprinting with scalar Costa scheme (SCS) and colluder weight recovery
— An anti-collusion fingerprinting system is developed to protect media files against time-varying collusion attacks based on the scalar Costa scheme (SCS) and colluder weight ...
Byung-Ho Cha, C.-C. Jay Kuo