Sciweavers

816 search results - page 11 / 164
» Simulation Distances
Sort
View
PIMRC
2010
IEEE
14 years 7 months ago
Euclidean distance decomposition to generate new 16-QAM and 64-QAM space-time trellis codes
In this paper, the generation of 16-QAM and 64-QAM space-time trellis codes (STTCs) for several transmit antennas is considered. The main problem with an exhaustive search is the i...
Pierre Viland, Gheorghe Zaharia, Jean-Franç...
ICASSP
2011
IEEE
14 years 1 months ago
Talker-to-listener distance effects on the variations of the intensity and the fundamental frequency of speech
In this study we focus on the relationship between the talker-tolistener distance (TLD) and the dynamics of speech intensity and fundamental frequency. A new experiment for the ex...
Thibaut Fux, Gang Feng, Veronique Zimpfer
DAC
2007
ACM
15 years 10 months ago
An Effective Guidance Strategy for Abstraction-Guided Simulation
tive Guidance Strategy for Abstraction-Guided Simulation Flavio M. De Paula Alan J. Hu Department of Computer Science, University of British Columbia, {depaulfm, ajh}@cs.ubc.ca D...
Flavio M. de Paula, Alan J. Hu
55
Voted
GLOBECOM
2008
IEEE
14 years 10 months ago
Distance-Enhancing Constrained Codes for Optical Recording Channels
Abstract— This paper proposes distance-enhancing constrained codes for optical recording channels. The repeated minimum transition runlength (RMTR) constraints are first investi...
Kui Cai, Kees A. Schouhamer Immink, Zhiliang Qin
EJWCN
2010
237views more  EJWCN 2010»
14 years 4 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang