Fakultät für Informatik
-
Technische Universität München
Lehrstuhl für Effiziente Algorithmen
Die bibliographische Datenbank LEABib
Suchen
•
Liste der Journale
•
Liste der Serien
•
Liste der Konferenzen
•
Ausgewählte Publikationen
Hilfe
Suche: Author="Poli, Alain"
Als [
bib
] [
pdf
] [
ps
] [
dvi
] [
xml
] herunterladen.
Low-floor Tanner codes via Hamming-Node or RSCC-node doping
Shadi Abu-Surra
,
Gianluigi Liva
,
William E. Ryan
Lecture Notes in Computer Science
3857
, 2006, pp. 245-254
A genetic algorithm for cocyclic Hadamard matrices
V. Álvarez
,
J.A. Armario
,
M.D. Frau
,
P. Real
Lecture Notes in Computer Science
3857
, 2006, pp. 144-153
A general framework for applying FGLM techniques to linear codes
M. Borges-Quintana
,
M.A. Borges-Trenard
,
E. Martínez-Moro
Lecture Notes in Computer Science
3857
, 2006, pp. 76-86
On bent and highly nonlinear balanced/resilient functions and their algebraic immunities
Claude Carlet
Lecture Notes in Computer Science
3857
, 2006, pp. 1-28
A class of fermat curves for which Weil-Serre's bound can be improved
Francis N. Castro
,
Ernesto Gomez
,
Oscar Moreno
Lecture Notes in Computer Science
3857
, 2006, pp. 128-135
Complementary sets and Reed-Muller codes for peak-to-average power ratio reduction in OFDM
Chao-Yu Chen
,
Chung-Hsuan Wang
,
Chi-chao Chao
Lecture Notes in Computer Science
3857
, 2006, pp. 317-327
On constructing AG codes without basis functions for Riemann-Roch spaces
Drue Coles
Lecture Notes in Computer Science
3857
, 2006, pp. 108-117
On achieving chosen ciphertext security with decryption errors
Yang Cui
,
Kazukuni Kobara
,
Hideki Imai
Lecture Notes in Computer Science
3857
, 2006, pp. 173-182
Computing Gröbner bases for vanishing ideals of finite sets of points
Jeffrey B. Farr
,
Shuhong Gao
Lecture Notes in Computer Science
3857
, 2006, pp. 118-127
On the Feng-Rao bound for generalized Hamming weights
Olav Geil
,
Christian Thommesen
Lecture Notes in Computer Science
3857
, 2006, pp. 295-306
A short random fingerprinting code against a small number of pirates
Manabu Hagiwara
,
Goichiro Hanaoka
,
Hideki Imai
Lecture Notes in Computer Science
3857
, 2006, pp. 193-202
Unconditionally secure chaffing-and-winnowing: A relationship between encryption and authentication
Goichiro Hanaoka
,
Yumiko Hanaoka
,
Manabu Hagiwara
,
Hajime Watanabe
,
Hideki Imai
Lecture Notes in Computer Science
3857
, 2006, pp. 154-162
The merit factor problem for binary sequences
Tom Hholdt
Lecture Notes in Computer Science
3857
, 2006, pp. 51-59
A theory of highly nonlinear functions
K.J. Horadam
Lecture Notes in Computer Science
3857
, 2006, pp. 87-100
LDPC codes for fading channels: Two strategies
Xiaowei Jin
,
Teng Li
,
Thomas E. Fuja
,
Oliver M. Collins
Lecture Notes in Computer Science
3857
, 2006, pp. 235-244
Long extended BCH codes are spanned by minimum weight words
Tali Kaufman
,
Simon Litsyn
Lecture Notes in Computer Science
3857
, 2006, pp. 285-294
New constructions of quasi-cyclic LDPC codes based on two classes of balanced incomplete block designs: For AWGN and binary erasure channels
Lan Lan
,
Ying Yu Tai
,
Shu Lin
,
Behshad Memari
,
Bahram Honary
Lecture Notes in Computer Science
3857
, 2006, pp. 275-284
Algebraic constructions of quasi-cyclic LDPC codes - Part I: For AWGN and binary random erasure channels
Lan Lan
,
Lingqi Zeng
,
Ying Y. Tai
,
Lei Chen
,
Shu Lin
,
Khaled Abdel-Ghaffar
Lecture Notes in Computer Science
3857
, 2006, pp. 255-264
On generalized parity checks
Robert J. McEliece
,
Edwin Soedarmadji
Lecture Notes in Computer Science
3857
, 2006, pp. 29-34
Traitor tracing against powerful attacks using combinatorial designs
Simon McNicol
,
Serdar Boztaş
,
Asha Rao
Lecture Notes in Computer Science
3857
, 2006, pp. 215-224
A general formulation of algebraic and fast correlation attacks based on dedicated sample decimation
Miodrag J. Mihaljević
,
Marc P.C. Fossorier
,
Hideki Imai
Lecture Notes in Computer Science
3857
, 2006, pp. 203-214
Cryptography based on bilinear maps
Tatsuaki Okamoto
Lecture Notes in Computer Science
3857
, 2006, pp. 35-50
Hadamard codes of length
2^ts
(
s
Odd). Rank and kernel
Kevin T. Phelps
,
Josep Rifà
,
Mercè Villanueva
Lecture Notes in Computer Science
3857
, 2006, pp. 328-337
Quantum period reconstruction of binary sequences
Florina Piroi
,
Arne Winterhof
Lecture Notes in Computer Science
3857
, 2006, pp. 60-67
The solutions of the third power sum equation for Niho type decimations
Kalle Ranto
,
Petri Rosendahl
Lecture Notes in Computer Science
3857
, 2006, pp. 101-107
Seiten 1
2
3
4
5
6
7
8
>