1997
DOI: 10.1007/978-1-4615-6313-6
|View full text |Cite
|
Sign up to set email alerts
|

Hadamard Matrix Analysis and Synthesis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

1999
1999
2016
2016

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 58 publications
(29 citation statements)
references
References 0 publications
0
29
0
Order By: Relevance
“…Like the Hadamard transform [22], the PT can be calculated using only additions (no multiplications are required). As shown in Section III, each projection requires approximately operations, but the calculations required to project onto (say) overlap the calculations required to project onto in a nontrivial way, and these redundancies can undoubtedly be exploited in a more efficient implementation.…”
Section: Discussionmentioning
confidence: 99%
“…Like the Hadamard transform [22], the PT can be calculated using only additions (no multiplications are required). As shown in Section III, each projection requires approximately operations, but the calculations required to project onto (say) overlap the calculations required to project onto in a nontrivial way, and these redundancies can undoubtedly be exploited in a more efficient implementation.…”
Section: Discussionmentioning
confidence: 99%
“…The only eigenvalues of the unnormalized Hadamard matrix of order N = 2 n are known to be 2 n/2 and −2 n/2 [18], hence the normalized Hadamard matrix H N has only the eigenvalues 1 and −1, each one has an eigenspace of dimension N/2. In [8] it was shown that the recursively computed eigenvectors with the formulas (5)- (7) are orthogonal and that the 2N eigenvectors of H 2N can be ordered in such a way that v k 2N has k sign-changes.…”
Section: Mathematical Backgroundmentioning
confidence: 99%
“…Since tag 34 IDs usually contain object-specific information, we should 35 prevent such information from leakage when it is privacy 36 sensitive for tagged objects [6,17,18]. In an anonymous RFID 37 system, RFID readers are not expected to collect IDs from 38 tags or to access them on the server [19][20][21][22]. This way, 39 tag IDs achieve anonymity and protect their associated pri- 40 vacy.…”
Section: Introductionmentioning
confidence: 99%