Sciweavers

3483 search results - page 172 / 697
» Forward
Sort
View
DCC
2007
IEEE
16 years 3 months ago
High-Rate Analysis of Systematic Lossy Error Protection of a Predictively Encoded Source
We consider a first-order Markov source, which is predictively encoded using a DPCM-style encoder. The quantized compressed prediction residual is transmitted over an erasure chan...
Shantanu Rane, David Rebollo-Monedero, Bernd Girod
ASAP
2009
IEEE
157views Hardware» more  ASAP 2009»
16 years 1 months ago
Low-Power ASIP Architecture Exploration and Optimization for Reed-Solomon Processing
The advent of the mobile age has heavily changed the requirements of today’s communication devices. Data transmission over interference-prone wireless channels requires addition...
Andreas Genser, Christian Bachmann, Christian Steg...
SOSP
2001
ACM
16 years 27 days ago
Building a Robust Software-Based Router Using Network Processors
Recent efforts to add new services to the Internet have increased interest in software-based routers that are easy to extend and evolve. This paper describes our experiences using...
Tammo Spalink, Scott Karlin, Larry L. Peterson, Yi...
133
Voted
ISBI
2009
IEEE
15 years 10 months ago
Multi GPU Implementation of Iterative Tomographic Reconstruction Algorithms
Although iterative reconstruction techniques (IRTs) have been shown to produce images of superior quality over conventional filtered back projection (FBP) based algorithms, the u...
Byunghyun Jang, David R. Kaeli, Synho Do, Homer H....
PERCOM
2009
ACM
15 years 10 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...