Sciweavers

1060 search results - page 107 / 212
» Notes on Coding Theory
Sort
View
77
Voted
SSWMC
2004
14 years 11 months ago
An informed synchronization scheme for audio data hiding
This paper deals with the problem of synchronization in the particular case of audio data hiding. In this kind of application the goal is to increase the information of an audio d...
Alejandro LoboGuerrero, Patrick Bas, Joel Lienard
ISCAS
2007
IEEE
94views Hardware» more  ISCAS 2007»
15 years 4 months ago
Fundamental Bounds on Power Reduction during Data-Retention in Standby SRAM
Abstract— We study leakage-power reduction in standby random access memories (SRAMs) during data-retention. An SRAM cell requires a minimum critical supply voltage (DRV) above wh...
Animesh Kumar, Huifang Qin, Prakash Ishwar, Jan M....
CORR
2010
Springer
184views Education» more  CORR 2010»
14 years 9 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener

Lecture Notes
4961views
16 years 7 months ago
The Relational Data Model, Normalisation and effective Database Design
I have been designing and building applications, including the databases used by those applications, for several decades now. I have seen similar problems approached by different d...
Tony Marston
INFOCOM
2010
IEEE
14 years 8 months ago
Stable Maximum Throughput Broadcast in Wireless Fading Channels
—This research considers network coded broadcast system with multi-rate transmission and dual queue stability constraints. Existing network coded broadcast systems consider singl...
Wei Pu, Hao Cui, Chong Luo, Feng Wu, Chang Wen Che...