Sciweavers

TIT
2008
139views more  TIT 2008»
13 years 11 months ago
Asymptotic Optimality Theory for Decentralized Sequential Hypothesis Testing in Sensor Networks
The decentralized sequential hypothesis testing problem is studied in sensor networks, where a set of sensors receive independent observations and send summary messages to the fusi...
Yajun Mei
TIT
2008
81views more  TIT 2008»
13 years 11 months ago
Lagrangian Vector Quantization With Combined Entropy and Codebook Size Constraints
Abstract--In this paper, the Lagrangian formulation of variablerate vector quantization is extended to quantization with simultaneous constraints on entropy and codebook size, incl...
Robert M. Gray, Tamás Linder, John T. Gill ...
TIT
2008
87views more  TIT 2008»
13 years 11 months ago
Coding Theorems on the Threshold Scheme for a General Source
In this paper, coding theorems on the (t; m)-threshold scheme for a general source are discussed, where m means the number of the shares and t means a threshold. The (t; m)-thresho...
Hiroki Koga
TIT
2008
123views more  TIT 2008»
13 years 11 months ago
Classes of Quadratic APN Trinomials and Hexanomials and Related Structures
A method for constructing differentially 4-uniform quadratic hexanomials has been recently introduced by J. Dillon. We give various generalizations of this method and we deduce th...
Lilya Budaghyan, Claude Carlet
TIT
2008
99views more  TIT 2008»
13 years 11 months ago
On the Connection-Level Stability of Congestion-Controlled Communication Networks
We are interested in the connection-level stability of a network employing congestion control. In particular, we study how the stability region of the network (i.e., the set of off...
Xiaojun Lin, Ness B. Shroff, R. Srikant
TIT
2008
111views more  TIT 2008»
13 years 11 months ago
The Bounded-Storage Model in the Presence of a Quantum Adversary
An extractor is a function that is used to extract randomness. Given an imperfect random source X and a uniform seed Y , the output (X; Y ) is close to uniform. We study properties...
Robert T. König, Barbara M. Terhal
TIT
2008
73views more  TIT 2008»
13 years 11 months ago
Security Aspects of the Authentication Used in Quantum Cryptography
Jorgen Cederlof, Jan-Ake Larsson
TIT
2008
89views more  TIT 2008»
13 years 11 months ago
Joint Fixed-Rate Universal Lossy Coding and Identification of Continuous-Alphabet Memoryless Sources
Abstract--The problem of joint universal source coding and density estimation is considered in the setting of fixed-rate lossy coding of continuous-alphabet memoryless sources. For...
Maxim Raginsky
TIT
2008
80views more  TIT 2008»
13 years 11 months ago
Entropy Amplification Property and the Loss for Writing on Dirty Paper
Costa's celebrated "writing on dirty paper" (WDP) shows that the powerconstrained channel Y = X + S + Z, with Gaussian Z, has the same capacity as the standard AWGN...
Aaron S. Cohen, Ram Zamir