Sciweavers

TIT
2008
84views more  TIT 2008»
13 years 11 months ago
Information Theoretic Bounds on Authentication Systems in Query Model
Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric key setting. Information theoretic bounds on the success probability...
Reihaneh Safavi-Naini, Peter R. Wild
TIT
2008
117views more  TIT 2008»
13 years 11 months ago
Cross-Layer Optimization of MAC and Network Coding in Wireless Queueing Tandem Networks
In wireless networks, throughput optimization is an essential performance objective that cannot be adequately characterized by a single criterion (such as the minimum transmitted o...
Yalin Evren Sagduyu, Anthony Ephremides
TIT
2008
82views more  TIT 2008»
13 years 11 months ago
Error Control Codes for Parallel Asymmetric Channels
We introduce and study error correcting codes for parallel synchronous communication via asymmetric channels. Constructions for error detecting/correcting codes are presented. Mor...
Rudolf Ahlswede, Harout K. Aydinian
TIT
2008
65views more  TIT 2008»
13 years 11 months ago
Power-Efficient Resource Allocation for Time-Division Multiple Access Over Fading Channels
We investigate resource allocation policies for time-division multiple access (TDMA) over fading channels in the power-limited regime. For frequency-flat block-fading channels and ...
Xin Wang, Georgios B. Giannakis
TIT
2008
81views more  TIT 2008»
13 years 11 months ago
Codes Defined by Forms of Degree 2 on Quadric Surfaces
We study the functional codes C2(X) defined on projective varieties X, in the case where X P3 is a 1-degenerate quadric or a non-degenerate quadric (hyperbolic or elliptic). We fi...
Frédéric A. B. Edoukou
TIT
2008
100views more  TIT 2008»
13 years 11 months ago
Communication Via Decentralized Processing
Abstract-- The common problem of a nomadic terminal sending information to a remote destination via agents with lossless connections is investigated. Such a setting suits, e.g. acc...
Amichai Sanderovich, Shlomo Shamai, Yossef Steinbe...
TIT
2008
147views more  TIT 2008»
13 years 11 months ago
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, the connections between codes, matroids, and a special cla...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
TIT
2008
103views more  TIT 2008»
13 years 11 months ago
Fast Distributed Algorithms for Computing Separable Functions
The problem of computing functions of values at the nodes in a network in a fully distributed manner, where nodes do not have unique identities and make decisions based only on loc...
Damon Mosk-Aoyama, Devavrat Shah
TIT
2008
68views more  TIT 2008»
13 years 11 months ago
On the Hardness of Decoding the Gale-Berlekamp Code
The Gale
Ron M. Roth, Krishnamurthy Viswanathan