Sciweavers

1486 search results - page 183 / 298
» Algorithms for two-box covering
Sort
View
VTC
2008
IEEE
157views Communications» more  VTC 2008»
15 years 11 months ago
Performance of MIMO Aware RRM in Downlink OFDMA
— This paper addresses advanced radio resource management (RRM) algorithms for multiple-input multipleoutput (MIMO) transmission schemes in downlink OFDMA systems. The analysis c...
István Z. Kovács, Markku Kuusela, El...
GLVLSI
2007
IEEE
139views VLSI» more  GLVLSI 2007»
15 years 11 months ago
Synthesis of irregular combinational functions with large don't care sets
A special logic synthesis problem is considered for Boolean functions which have large don’t care sets and are irregular. Here, a function is considered as irregular if the inpu...
Valentin Gherman, Hans-Joachim Wunderlich, R. D. M...
IPPS
2007
IEEE
15 years 10 months ago
ESSTCP: Enhanced Spread-Spectrum TCP
Having stealth and lightweight authentication methods is empowering network administrators to shelter critical services from adversaries. Spread-Spectrum TCP (SSTCP) [1] is one of...
Amir R. Khakpour, Hakima Chaouchi
EMMCVPR
2007
Springer
15 years 10 months ago
Decomposing Document Images by Heuristic Search
Abstract. Document decomposition is a basic but crucial step for many document related applications. This paper proposes a novel approach to decompose document images into zones. I...
Dashan Gao, Yizhou Wang
IBPRIA
2007
Springer
15 years 10 months ago
Line Extraction from Mechanically Scanned Imaging Sonar
Abstract. The extraction of reliable features is a key issue for autonomous underwater vehicle navigation. Imaging sonars can produce acoustic images of the surroundings of the veh...
David Ribas, Pere Ridao, José Neira, Juan D...