Sciweavers

152 search results - page 30 / 31
» On Bit Error Robustness of Trellis Source Codes
Sort
View
WISEC
2010
ACM
13 years 10 months ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
ICIP
2000
IEEE
14 years 7 months ago
Copyright Labeling of Printed Images
Digital Watermarking is a labeling technique for digital images which embeds a code into the digital data so the data is marked. Watermarking techniques previously developed deal ...
Hagit Zabrodsky Hel-Or
ICC
2007
IEEE
146views Communications» more  ICC 2007»
14 years 3 days ago
Optimally Mapping an Iterative Channel Decoding Algorithm to a Wireless Sensor Network
–Retransmission based schemes are not suitable for energy constrained wireless sensor networks. Hence, there is an interest in including parity bits in each packet for error cont...
Saad B. Qaisar, Shirish S. Karande, Kiran Misra, H...
PPPJ
2006
ACM
13 years 11 months ago
The Project Maxwell assembler system
The JavaTM programming language is primarily used for platform-independent programming. Yet it also offers many productivity, maintainability and performance benefits for platfo...
Bernd Mathiske, Douglas N. Simon, Dave Ungar
BMCBI
2007
160views more  BMCBI 2007»
13 years 5 months ago
Identifying protein complexes directly from high-throughput TAP data with Markov random fields
Background: Predicting protein complexes from experimental data remains a challenge due to limited resolution and stochastic errors of high-throughput methods. Current algorithms ...
Wasinee Rungsarityotin, Roland Krause, Arno Sch&ou...