Sciweavers

195 search results - page 12 / 39
» Perfect Byte-Correcting Codes
Sort
View
ICS
1999
Tsinghua U.
15 years 4 months ago
An experimental evaluation of tiling and shackling for memory hierarchy management
On modern computers, the performance of programs is often limited by memory latency rather than by processor cycle time. To reduce the impact of memory latency, the restructuring ...
Induprakas Kodukula, Keshav Pingali, Robert Cox, D...
VTC
2006
IEEE
142views Communications» more  VTC 2006»
15 years 5 months ago
Adaptive Bit-Interleaved Coded OFDM over Time-Varying Channels
When adapting the transmitter to the channel state information (CSI), improved transmission is possible compared to the open loop system where no CSI is provided at the transmitte...
Jin Soo Choi, Chang-Kyung Sung, Sung Hyun Moon, In...
ICSE
2008
IEEE-ACM
15 years 12 months ago
Security metrics for source code structures
Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been...
Istehad Chowdhury, Brian Chan, Mohammad Zulkernine
CISS
2008
IEEE
15 years 6 months ago
Near optimal lossy source coding and compression-based denoising via Markov chain Monte Carlo
— We propose an implementable new universal lossy source coding algorithm. The new algorithm utilizes two wellknown tools from statistical physics and computer science: Gibbs sam...
Shirin Jalali, Tsachy Weissman
TWC
2008
159views more  TWC 2008»
14 years 11 months ago
Hierarchical Space-Time Block Code Recognition Using Correlation Matrices
The blind recognition of communication parameters is a key research issue for commercial and military communication systems. The results of numerous investigations about symbol tim...
Vincent Choqueuse, Koffi Yao, Ludovic Collin, Gill...