Revisiting Multivariate Lattices for Encrypted Signal Processing
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
A multi-stage secret sharing (MSS) scheme is a method of sharing a number of secrets among a set of participants, such that any authorized subset of participants could recover one secret in every stage. The first MSS scheme was proposed by He and Dawson in ...
In this paper we address the problem of driving a group of agents towards a consensus point when the agents have a discrete-time single- or double-integrator dynamics and the communication network is time-varying. We propose decentralized Model Predictive ...
This paper presents a numerical simulation study of the transient behavior of a 2x340MW pump-turbine power plant, where the results show an unstable behavior at runaway. First, the modeling of hydraulic components based on equivalent schemes is presented. ...
International Association For Hydraulic Research2008
Injection locking of two DFB semiconductors opens new possibilities to generate effective signals for optical sensing, in order to reach better performances. Pure wave forms can be generated with qualities exceeding those obtained using external modulators ...
Personal computing and communication devices such as computers, personal digital assistants (PDAs), and mobile phones are moving to their next generation in which the end user will be able to access a multitude of information with a single device either lo ...
We present a comparison of different two-step holographic recording schemes based on their multiplexing performance using a unified framework. The difference between the different schemes is mainly due to the energy levels and sources of the traps. The inf ...
Spie-Int Soc Optical Engineering, Po Box 10, Bellingham, Wa 98227-0010 Usa1998
In this paper, we introduce novel schemes for scalable Distributed Video Coding (DVC), dealing with temporal, spatial and quality scalabilities. More specifically, conventional coding is used to obtain a base layer. DVC is then applied to generate enhancem ...
In some remote sensing applications, the functional relationship between the source being observed and the sensor readings may not be known. Because of communication constraints, this uncertainty may result in poor end-to-end distortion. If the sensors hav ...
Ieee Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, Nj 08855-1331 Usa2005
We consider a simple network, where a source and destination node are connected with a line of erasure channels. It is well known that in order to achieve the min-cut capacity, the intermediate nodes are required to process the information. We propose codi ...
In recent years, researchers have invested a lot of effort in trying to design suitable alternatives to the RSA signature scheme, with lower computational requirements. The idea of using polynomial equations of low degree in several unknowns, with some hid ...