Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- articleJuly 2013
Identities for the Ramanujan zeta function
Advances in Applied Mathematics (AAMA), Volume 51, Issue 2Pages 266–275https://doi.org/10.1016/j.aam.2013.04.001We prove formulas for special values of the Ramanujan tau zeta function. Our formulas show that L(@D,k) is a period in the sense of Kontsevich and Zagier when k>=12. As an illustration, we reduce L(@D,k) to explicit integrals of hypergeometric and ...
- ArticleAugust 2010
Simulation and Application of Soft Input Decryption
SIMUL '10: Proceedings of the 2010 Second International Conference on Advances in System SimulationPages 94–98https://doi.org/10.1109/SIMUL.2010.8This paper presents a model for a software simulation of the algorithm of Soft Input Decryption. Soft Input Decryption is the algorithm which uses L-values (soft output) of a Soft Input Soft Output channel decoder for the correction of secured data ...
- articleSeptember 2009
Distribution of max-log metrics for QAM-based BICM in fading channels
IEEE Transactions on Communications (TC), Volume 57, Issue 9Pages 2558–2563https://doi.org/10.1109/TCOMM.2009.09.070567In this letter we derive closed-form expressions for the probability density functions (PDFs) of the bits' reliability metrics (L-values) in bit-interleaved coded modulation (BICM) transmission over fully-interleaved fading channels. The expressions are ...
- articleJuly 2009
Distribution of L-values in gray-mapped M2-QAM: closed-form approximations and applications
IEEE Transactions on Communications (TC), Volume 57, Issue 7Pages 2071–2079https://doi.org/10.1109/TCOMM.2009.07.070506In this paper we develop closed form approximations for the probability density function (PDF) of the reliability metrics (L-values) in bit-interleaved coded modulation (BICM). The expressions are valid for M2-ary quadrature amplitude modulations (M2-...
- ArticleJune 2009
Correcting suboptimal metrics in iterative decoders
In this paper the issue of improving the performance of iterative decoders based on sub-optimal calculation of the messages exchanged during iterations (L-values) is addressed. It is well known in the literature that a simple-yet very effective-- way to ...
- ArticleJuly 2008
Method for improvement of soft input decryption performances
In this work, the strategy for correction of bits using Soft Input Decryption is analyzed. Soft Input Decryption is used for correction of cryptographic check values, which are very fragile when they are transmitted over noisy channels: only one wrong ...
- ArticleMay 2008
Feedback using dummy bits
ACC'08: Proceedings of the WSEAS International Conference on Applied Computing ConferencePages 104–107Feedback is used for improvement of Soft Input Decryption. Soft Input Decryption enables integration of decryption into the decoding process for correction of cryptographic check values. This paper develops an idea of improvement of feedback by usage of ...
- articleMay 2008
Feedback in soft input decryption
This paper develops further the idea of use of Soft Input Decryption. The function of Soft Input Decryption is to integrate decryption into the decoding process. In this paper it is shown how Soft Input Decryption can be enhanced using feedback from the ...
- ArticleMarch 2008
Probability of collisions in soft input decryption
In this work, probability of collision in Soft Input Decryption has been analyzed and calculated. Collisions of cryptographic check values cause wrong verification results. Therefore, it is important to find an analytical form of a probability of ...
- ArticleFebruary 2008
Soft input decryption using feedback
In this paper the research based on the idea of use of Soft Input Decryption is further developed. The function of Soft Input Decryption is to integrate decryption into the decoding process. This paper shows how Soft Input Decryption can be enhanced ...
- articleFebruary 2008
Channel coding as a cryptography enhancer
In this work, channel decoding is considered as a promising way for improvement of cryptographic functions. Use of MAC/H-MAC values and digital signatures is analyzed in a context of code concatenation, together with convolutional codes using MAP ...
- ArticleAugust 2007
On the distribution of extrinsic L-values in gray-mapped 16-QAM
IWCMC '07: Proceedings of the 2007 international conference on Wireless communications and mobile computingPages 329–336https://doi.org/10.1145/1280940.1281011In this paper we address the issue of probabilistic modelling of the extrinsic L-values, used as reliability metrics in the context of bit interleaved coded modulation with iterative demapping (BICM-ID). Starting with a simple piece-wise linear model of ...
- ArticleJuly 2007
Channel coding as a cryptography enhancer
ICCOM'07: Proceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 11Pages 273–278In this work, channel decoding is considered as a promising way for improvement of cryptographic functions. Use of MAC/H-MAC values and digital signatures is analyzed in a context of code concatenation, together with convolutional codes using MAP ...
- articleApril 2000
Fundamental Concepts in Programming Languages
Higher-Order and Symbolic Computation (HOSC), Volume 13, Issue 1-2Pages 11–49https://doi.org/10.1023/A:1010000313106This paper forms the substance of a course of lectures given at the International Summer School in Computer Programming at Copenhagen in August, 1967. The lectures were originally given from notes and the paper was written after the course was finished. In ...