Sciweavers

1060 search results - page 70 / 212
» Notes on Coding Theory
Sort
View
P2P
2007
IEEE
161views Communications» more  P2P 2007»
15 years 4 months ago
The BitCod Client: A BitTorrent Clone using Network Coding
Network coding is an emerging field of research with sound and mature theory supporting it. Recent works shows that it has many benefits like improved fault tolerance, higher ...
Danny Bickson, Roy Borer
POPL
2006
ACM
15 years 10 months ago
Certified assembly programming with embedded code pointers
Embedded code pointers (ECPs) are stored handles of functions and continuations commonly seen in low-level binaries as well as functional or higher-order programs. ECPs are known ...
Zhaozhong Ni, Zhong Shao
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
15 years 3 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
ICC
2007
IEEE
120views Communications» more  ICC 2007»
15 years 4 months ago
Narrowband Interference Mitigation in Turbo-Coded OFDM Systems
— A method for the mitigation of the effect of narrowband interference (NBI) on the turbo decoder in OFDM systems is proposed. The presence of NBI leads to a contaminated Gaussia...
Sheetal Kalyani, Vimal Raj, Krishnamurthy Giridhar
CORR
1999
Springer
124views Education» more  CORR 1999»
14 years 9 months ago
An Algebraic Programming Style for Numerical Software and its Optimization
The abstract mathematical theory of partial differential equations (PDEs) is formulated in terms of manifolds,scalar fields, tensors, and the like, but these algebraic structures a...
T. B. Dinesh, Magne Haveraaen, Jan Heering