Sciweavers

2945 search results - page 173 / 589
» Noisy Network Coding
Sort
View
102
Voted
WCNC
2008
IEEE
15 years 10 months ago
Two-Stage Code Acquisition Employing Search Space Reduction and Iterative Detection in the DS-UWB Downlink
— In this paper we propose and investigate an iterative code acquisition scheme assisted by both search space reduction and iterative Massage Passing (MP), which was designed for...
Seung Hwan Won, Lajos Hanzo
119
Voted
ICMCS
2007
IEEE
149views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Joint Source Coding and Data Rate Adaptation for Multi-User Wireless Video Transmission
Much attention has been paid to the problem of optimally utilizing resources such as spectrum, power and time in order to achieve the best video delivery quality in wireless commu...
Fan Zhai, Zhu Li, Aggelos K. Katsaggelos
130
Voted
DSN
2007
IEEE
15 years 10 months ago
An Architectural Approach to Preventing Code Injection Attacks
Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the NX-bit and PaX have been useful in limiting the a...
Ryan Riley, Xuxian Jiang, Dongyan Xu
139
Voted
DSN
2009
IEEE
15 years 7 months ago
An efficient XOR-scheduling algorithm for erasure codes encoding
In large storage systems, it is crucial to protect data from loss due to failures. Erasure codes lay the foundation of this protection, enabling systems to reconstruct lost data w...
Jianqiang Luo, Lihao Xu, James S. Plank
125
Voted
BMEI
2008
IEEE
15 years 10 months ago
Using Phylogenetic Relationships to Improve the Inference of Transcriptional Regulatory Networks
Inferring transcriptional regulatory networks from geneexpression data remains a challenging problem, in part because of the noisy nature of the data and the lack of strong networ...
Xiuwei Zhang, Maryam Zaheri, Bernard M. E. Moret