Sciweavers

351 search results - page 23 / 71
» Perfect Constraints Are Tractable
Sort
View
GLOBECOM
2008
IEEE
15 years 8 months ago
Blind Turbo Channel Estimation of QAM Signals Exploiting Code Constraints
—We present a blind turbo equalizer for QAM signals that exploits the statistics that a channel code imposes on the transmitted signal. The receiver is an adaptation of previous ...
André Fonseca dos Santos, Wolfgang Rave, Ge...
RE
2007
Springer
15 years 8 months ago
Choosing a Tram Route: An Experience in Trading-Off Constraints
Trading-off is a familiar element in requirements practice, but it generally assumes a set of independent requirements competing for resources. Choosing a tram route depends inste...
Ian Alexander
112
Voted
IWQOS
2005
Springer
15 years 7 months ago
Overlay Networks with Linear Capacity Constraints
Abstract. Previous work have assumed an independent model for overlay networks: a graph with independent link capacities. We introduce a model of overlays (LCC-overlay) which incor...
Ying Zhu, Baochun Li
108
Voted
NOSSDAV
1995
Springer
15 years 5 months ago
Meeting Arbitrary QoS Constraints Using Dynamic Rate Shaping of Coded Digital Video
Abstract. We introduce the concept of Dynamic Rate Shaping, a technique to adapt the rate ofcompressed video bitstreams MPEG-1, MPEG2, H.261, as well as JPEG to dynamically varyi...
Alexandros Eleftheriadis, Dimitris Anastassiou
DATE
2009
IEEE
116views Hardware» more  DATE 2009»
15 years 8 months ago
Successful attack on an FPGA-based WDDL DES cryptoprocessor without place and route constraints
In this paper, we propose a preprocessing method to improve Side Channel Attacks (SCAs) on Dual-rail with Precharge Logic (DPL) countermeasure family. The strength of our method i...
Laurent Sauvage, Sylvain Guilley, Jean-Luc Danger,...