Sciweavers

339 search results - page 56 / 68
» An ADC-BiST scheme using sequential code analysis
Sort
View
HICSS
1995
IEEE
128views Biometrics» more  HICSS 1995»
15 years 3 months ago
Instruction Level Parallelism
Abstract. We reexamine the limits of parallelism available in programs, using runtime reconstruction of program data-flow graphs. While limits of parallelism have been examined in...
VTC
2010
IEEE
156views Communications» more  VTC 2010»
14 years 9 months ago
A Unified MIMO Architecture Subsuming Space Shift Keying, OSTBC, BLAST and LDC
In this paper, motivated by the recent concept of Spatial Modulation (SM), we propose a novel Generalized Space-Time Shift Keying (G-STSK) architecture, which acts as a unified Mul...
Shinya Sugiura, Sheng Chen, Lajos Hanzo
INFOCOM
2010
IEEE
14 years 10 months ago
Understanding Sub-stream Scheduling in P2P Hybrid Live Streaming Systems
—The P2P pull-push hybrid architecture has achieved great success in delivering live video traffic over the Internet. However, a formal study on the sub-stream scheduling proble...
Zhenjiang Li, Danny H. K. Tsang, Wang-Chien Lee
INFOCOM
2010
IEEE
14 years 10 months ago
Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication
—Jamming resistance is crucial for applications where reliable wireless communication is required. Spread spectrum techniques such as Frequency Hopping Spread Spectrum (FHSS) and...
Yao Liu, Peng Ning, Huaiyu Dai, An Liu
ASIACRYPT
2000
Springer
15 years 4 months ago
Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications
Abstract. We investigate several alternate characterizations of pseudorandom functions (PRFs) and pseudorandom permutations (PRPs) in a concrete security setting. By analyzing the ...
Anand Desai, Sara K. Miner