Sciweavers

2068 search results - page 75 / 414
» On Effectiveness of Application-Layer Coding
Sort
View
141
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Throughput-Delay Tradeoffs in Large-Scale MANETs with Network Coding
—This paper characterizes the throughput-delay tradeoffs in mobile ad hoc networks (MANETs) with network coding, and compares results in the situation where only replication and ...
Chi Zhang, Yuguang Fang, Xiaoyan Zhu
VTC
2008
IEEE
110views Communications» more  VTC 2008»
15 years 10 months ago
FFT Sign Search with Secondary Code Constraints for GNSS Signal Acquisition
— New GNSS signals are usually characterized by the presence of secondary codes and high data rates that can make the sign of the transmitted signal change each primary code peri...
Daniele Borio
SMC
2007
IEEE
15 years 10 months ago
Improved collusion-secure codes for digital fingerprinting based on finite geometries
Abstract— Digital fingerprinting, a copyright protection technique for digital contents, is considered. Digital fingerprinting should deter collusion attacks, where several fi...
Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hiras...
APCCAS
2006
IEEE
253views Hardware» more  APCCAS 2006»
15 years 10 months ago
Design of Optimal Decimation and Interpolation Filters for Low Bit-Rate Image Coding
— The DCT-based JPEG standard is certainly one of the most successful applications of transform coding methods for still digital images. A commonly recognized disadvantage of the...
Wu-Sheng Lu, A.-M. Sevcenco
ICSM
2006
IEEE
15 years 10 months ago
On the Use of Line Co-change for Identifying Crosscutting Concern Code
Crosscutting concerns are software system features whose implementation is spread across many modules as tangled and scattered code. Identifying such code helps developers to chan...
Gerardo Canfora, Luigi Cerulo, Massimiliano Di Pen...