Sciweavers

1021 search results - page 153 / 205
» On the correlation of binary sequences
Sort
View
HICSS
2008
IEEE
143views Biometrics» more  HICSS 2008»
15 years 4 months ago
Bounding Prefix Transposition Distance for Strings and Permutations
A transposition is an operation that exchanges two adjacent substrings. When it is restricted so that one of the substrings is a prefix, it is called a prefix transposition. The p...
Bhadrachalam Chitturi, Ivan Hal Sudborough
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 4 months ago
Exact Multiple Access Analysis for Pulsed DS-UWB Systems with Episodic Transmission in Flat Nakagami Fading
— Exact bit error probabilities (BEP) are derived in closed form for pulsed binary direct sequence ultra-wideband (DS-UWB) multiple access systems in flat Nakagami fading channe...
Mohammad Azizur Rahman, Shigenobu Sasaki, Hisakazu...
ICMCS
2007
IEEE
130views Multimedia» more  ICMCS 2007»
15 years 4 months ago
Wyner-Ziv Video Coding Based on Turbo Codes Exploiting Perfect Knowledge of Parity Bits
In a Wyner-Ziv video coding system based on turbo codes, parity bits are generated for a Wyner-Ziv frame and transmitted to the decoder. In this context of distributed source codi...
Hu Chen, Eckehard G. Steinbach
CLEAR
2007
Springer
145views Biometrics» more  CLEAR 2007»
15 years 4 months ago
Multi-person Tracking Strategies Based on Voxel Analysis
Abstract. This paper presents two approaches to the problem of simultaneous tracking of several people in low resolution sequences from multiple calibrated cameras. Spatial redunda...
Cristian Canton-Ferrer, Jordi Salvador, Josep R. C...
ACSAC
2006
IEEE
15 years 4 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...