Sciweavers

110 search results - page 14 / 22
» Correlation exploitation in error ranking
Sort
View
VTC
2007
IEEE
108views Communications» more  VTC 2007»
15 years 5 months ago
Joint Optimization of Iterative Source and Channel Decoding Using Over-Complete Source-Mapping
— The intentionally imposed or inherent unintentional residual redundancy found in source encoded bitstreams can be exploited for supporting joint SoftBit-Source Decoding and Cha...
Anh Quang Pham, Lie-Liang Yang, Lajos Hanzo
TCOM
2010
67views more  TCOM 2010»
14 years 10 months ago
Receive antenna selection for unitary space-time modulation over semi-correlated Ricean channels
—Receive antenna selection for unitary space-time modulation (USTM) over semi-correlated Ricean fading channels is analyzed (this work generalizes that of Ma and Tepedelenlio˘gl...
Mahdi Ramezani, Mahdi Hajiaghayi, Chintha Tellambu...
115
Voted
SIGMOD
2004
ACM
154views Database» more  SIGMOD 2004»
15 years 11 months ago
Compressing Historical Information in Sensor Networks
We are inevitably moving into a realm where small and inexpensive wireless devices would be seamlessly embedded in the physical world and form a wireless sensor network in order t...
Antonios Deligiannakis, Yannis Kotidis, Nick Rouss...
BIOCOMP
2010
14 years 8 months ago
Using the Genetic Code Wisdom for Recognizing Protein Coding Sequences
We have elaborated a new method of recognizing protein coding sequences in genomic sequences. The method is exploiting a specific way of genetic code degeneration and relations bet...
Pawel Blazej, Pawel Mackiewicz, Stanislaw Cebrat
ICCAD
2005
IEEE
106views Hardware» more  ICCAD 2005»
15 years 5 months ago
Fast balanced stochastic truncation via a quadratic extension of the alternating direction implicit iteration
— Balanced truncation (BT) model order reduction (MOR) is known for its superior accuracy and computable error bounds. Balanced stochastic truncation (BST) is a particular BT pro...
Ngai Wong, Venkataramanan Balakrishnan