Sciweavers

3898 search results - page 337 / 780
» On the Bit Extraction Problem
Sort
View
134
Voted
ICMCS
2006
IEEE
127views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Effective Error Concealment Algorithm by Boundary Information for H.264 Video Decoder
H.264 is a new video coding standard which contains some novel coding functions and provides more coding efficiency than previous standards. However, video streams are sensitive t...
Guang-Tung Jian, Mei-Juan Chen, Ming-Chieh Chi
127
Voted
INFOCOM
2006
IEEE
15 years 10 months ago
Resource Allocation for Multicast Services in Multicarrier Wireless Communications
— We consider a multicast resource allocation problem for the downlink in OFDM-based wireless cellular network systems. In a conventional multicast system, to accommodate users w...
Changho Suh, Jeonghoon Mo
ISCA
2006
IEEE
123views Hardware» more  ISCA 2006»
15 years 10 months ago
Improving Cost, Performance, and Security of Memory Encryption and Authentication
Protection from hardware attacks such as snoopers and mod chips has been receiving increasing attention in computer architecture. This paper presents a new combined memory encrypt...
Chenyu Yan, Daniel Englender, Milos Prvulovic, Bri...
134
Voted
CEC
2005
IEEE
15 years 9 months ago
A quantitative approach for validating the building-block hypothesis
The building blocks are common structures of high-quality solutions. Genetic algorithms often assume the building-block hypothesis. It is hypothesized that the high-quality solutio...
Chatchawit Aporntewan, Prabhas Chongstitvatana
FPT
2005
IEEE
170views Hardware» more  FPT 2005»
15 years 9 months ago
High Quality Uniform Random Number Generation Through LUT Optimised Linear Recurrences
This paper describes a class of FPGA-specific uniform random number generators with a 2k −1 length period, which can provide k random bits per-cycle for the cost of k Lookup Ta...
David B. Thomas, Wayne Luk