JS Plank - Software: Practice and Experience, 1997 - Wiley Online Library
It is well‐known that Reed‐Solomon codes may be used to provide error correction for multiple failures in RAID‐like systems. The coding technique itself, however, is not as well …
High-dimensional probability offers insight into the behavior of random vectors, random matrices, random subspaces, and objects used to quantify uncertainty in high dimensions …
This book gives an elementary treatment of the basic material about graph spectra, both for ordinary, and Laplace and Seidel spectra. The text progresses systematically, by covering …
The idea for this book came from the time the authors spent at the Statistics and Applied Mathematical Sciences Institute (SAMSI) in Research Triangle Park in North Carolina …
Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. A strong background in the mathematics underlying …
Wireless power transfer (WPT) is an emerging paradigm that will enable using wireless to its full potential in future networks, not only to convey information but also to deliver energy …
Y Dodis, L Reyzin, A Smith - … : International Conference On The Theory And …, 2004 - Springer
We provide formal definitions and efficient secure techniques for turning biometric information into keys usable for any cryptographic application, and reliably and securely …
Despite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is still not rigorously …
AR Calderbank, EM Rains, PM Shor… - IEEE Transactions on …, 1998 - ieeexplore.ieee.org
The problem of finding quantum error correcting codes is transformed into the problem of finding additive codes over the field GF (4) which are self-orthogonal with respect to a …