Abstract
No abstract available.
Cited By
- Brodzik A (2011). Construction of sparse representations of perfect polyphase sequences in Zak space with applications to radar and communications, EURASIP Journal on Advances in Signal Processing, 2011, (1-14), Online publication date: 1-Jan-2011.
- Shahabi C and Khoshgozaran A Location privacy in geospatial decision-making Proceedings of the 5th international conference on Databases in networked information systems, (1-15)
- Khoshgozaran A and Shahabi C Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy Proceedings of the 10th international conference on Advances in spatial and temporal databases, (239-257)
- Nishiguchi H, Imiya A and Sakai T Hierarchical tree of image derived by diffusion filtering Proceedings of the 11th international conference on Combinatorial Image Analysis, (453-465)
- Krengel E, Tirkel A and Hall T New sets of binary and ternary sequences with low correlation Proceedings of the Third international conference on Sequences and Their Applications, (220-235)
- Boussakta S, Alshibami O and Bouridane A (2004). Vector radix-4 × 4 for fast calculation of the 2-D new Mersenne number transform, Signal Processing, 84:12, (2231-2244), Online publication date: 1-Dec-2004.
- Brincat K (2019). On the Use of RSA as a Secret Key Cryptosystem, Designs, Codes and Cryptography, 22:3, (317-329), Online publication date: 1-Apr-2001.
- Tirkel A and Hall T (2001). A Unique Watermark for Every Image, IEEE MultiMedia, 8:4, (30-37), Online publication date: 1-Oct-2001.
- Tirkel A and Hall T Watermarking at point of origin Proceedings of the 2000 ACM workshops on Multimedia, (135-138)
- MÄKILÄ P and PARTINGTON J (2019). Lethargy results in LTI System Modelling, Automatica (Journal of IFAC), 34:9, (1061-1070), Online publication date: 1-Sep-1998.
- Gold H (2019). A Markovian single server with upstream job and downstream demand arrival stream, Queueing Systems: Theory and Applications, 30:3/4, (435-455), Online publication date: 14-Jun-1998.
- Odlyzko A Search for the maximum of a random walk Proceedings of the twenty-sixth annual ACM symposium on Theory of Computing, (336-345)
- Gupta R, Smolka S and Bhaskar S (1994). On randomization in sequential and distributed algorithms, ACM Computing Surveys (CSUR), 26:1, (7-86), Online publication date: 1-Mar-1994.
- Baker H (1992). Computing A*B (mod N) efficiently in ANSI C, ACM SIGPLAN Notices, 27:1, (95-98), Online publication date: 1-Jan-1992.
Index Terms
- Number theory in science and communication
Recommendations
Communication styles for parallel systems
Distributed-memory parallel systems rely on explicit message exchange for communication, but the communication operations they support can differ in many aspects. One key difference is the way messages are generated or consumed. With systolic ...