Sciweavers

5056 search results - page 198 / 1012
» Network Coding Theory
Sort
View
IJCINI
2007
125views more  IJCINI 2007»
15 years 2 months ago
A Unified Approach To Fractal Dimensions
The Cognitive Processes of Abstraction and Formal Inferences J. A. Anderson: A Brain-Like Computer for Cognitive Software Applications: the Resatz Brain Project L. Flax: Cognitive ...
Witold Kinsner
ICIP
2008
IEEE
16 years 4 months ago
A perceptual metric for blind measurement of blocking artifacts with applications in transform-block-based image and video codin
In this paper, we analyze the formation of blocking artifacts as a result of quantization of the discrete cosine transform (DCT) coefficients. These artifacts are known to be the ...
Koohyar Minoo, Truong Q. Nguyen
TCOM
2008
66views more  TCOM 2008»
15 years 2 months ago
Lattice codes for amplified direct-detection optical systems
Theories of shaping for lattice codes have been developed for systems (optical or non-optical) using coherent detection with additive white Gaussian noise (AWGN) and for direct-det...
Wei Mao, Joseph M. Kahn
CODES
2009
IEEE
15 years 6 months ago
Squashing microcode stores to size in embedded systems while delivering rapid microcode accesses
Microcoded customized IPs offer superior performance and direct programmability of micro-architectural structures compared to instruction-based processors, yet at the cost of dra...
Chengmo Yang, Mingjing Chen, Alex Orailoglu
RAID
2010
Springer
15 years 1 months ago
Hybrid Analysis and Control of Malware
Abstract. Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ....
Kevin A. Roundy, Barton P. Miller