Sciweavers

397 search results - page 48 / 80
» Overview of LDPC Codes
Sort
View
132
Voted
ICIP
2005
IEEE
16 years 5 months ago
H.264/MPEG4-AVC fidelity range extensions: tools, profiles, performance, and application areas
The technical work on the first amendment of the H.264/MPEG4-AVC video coding standard has recently been completed. In these so-called Fidelity Range Extensions (FRExt) a set of ne...
Detlev Marpe, Thomas Wiegand, Stephen Gordon
122
Voted
ISW
1997
Springer
15 years 7 months ago
Cryptanalysis of Message Authentication Codes
This paper gives a survey of attacks on Message Authentication Codes (MACs). First it defines the required security properties. Next it describes generic forgery and key recovery...
Bart Preneel
123
Voted
ASWEC
2005
IEEE
15 years 9 months ago
Virtual Machines, Managed Code and Component Technology
machines have been used as an implementation mechanism for programming languages for more than thirty years. In their latest incarnation execution engines based on virtual machine...
John Gough
148
Voted
MCSS
2009
Springer
15 years 10 months ago
Adaptive BICM-OFDM Systems
Link Adaptation for Orthogonal Frequency Division Multiplex (OFDM) systems is an important topic to achieve higher spectral efficiencies or better error rate performance. However, ...
Carsten Bockelmann, Dirk Wübben, Karl-Dirk Ka...
GLOBECOM
2008
IEEE
15 years 10 months ago
Secret Key Generation and Agreement in UWB Communication Channels
—It has been shown that the radio channel impulse response for a pair of legitimate Ultra-wide band (UWB) transceivers can be used to generate secret keys for secure communicatio...
Masoud Ghoreishi Madiseh, Michael L. McGuire, Step...