Sciweavers

2945 search results - page 281 / 589
» Noisy Network Coding
Sort
View
MM
2004
ACM
109views Multimedia» more  MM 2004»
15 years 9 months ago
Loss-resilient on-demand media streaming using priority encoding
A novel solution to the reliable multicast problem is the “digital fountain” approach, in which data is encoded with an erasure protection code before transmission, and receiv...
Cheng Huang, Ramaprabhu Janakiraman, Lihao Xu
ICS
2010
Tsinghua U.
15 years 8 months ago
Overlapping communication and computation by using a hybrid MPI/SMPSs approach
– Communication overhead is one of the dominant factors that affect performance in high-performance computing systems. To reduce the negative impact of communication, programmers...
Vladimir Marjanovic, Jesús Labarta, Eduard ...
JSAC
1998
110views more  JSAC 1998»
15 years 3 months ago
Turbo Decoding as an Instance of Pearl's "Belief Propagation" Algorithm
—In this paper, we will describe the close connection between the now celebrated iterative turbo decoding algorithm of Berrou et al. and an algorithm that has been well known in ...
Robert J. McEliece, David J. C. MacKay, Jung-Fu Ch...
INFOCOM
2009
IEEE
15 years 10 months ago
Blind Detection of Spread Spectrum Flow Watermarks
— Recently, the direct sequence spread-spectrum (DSSS)-based technique has been proposed to trace anonymous network flows. In this technique, homogeneous pseudo-noise (PN) codes...
Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Don...
144
Voted
WCNC
2008
IEEE
15 years 10 months ago
Decoding on Graphs: LDPC-Coded MISO Systems and Belief Propagation
— This paper proposes a new approach for decoding LDPC codes over MISO channels. Since in an nT × 1 MISO system with a modulation of alphabet size 2M, nT transmitted symbols are...
Amir H. Djahanshahi, Paul H. Siegel, Laurence B. M...