Sciweavers

7393 search results - page 1195 / 1479
» Synthesis-for-testability using transformations
Sort
View
INFOCOM
2008
IEEE
15 years 10 months ago
Information Concealing Games
— Consider the situation in which a decision maker (Actor) has to decide which of several available resources to use in the presence of an adversary (called Controller) that can ...
Saswati Sarkar, Eitan Altman, Rachid El Azouzi, Ye...
ISCAS
2008
IEEE
155views Hardware» more  ISCAS 2008»
15 years 10 months ago
Advanced colluder detection techniques for OSIFT-based hiding codes
— In this work, we examine a family of anti-collusion codes using the principle of “Orthogonal Spreading followed by the Inverse Fourier Transform (OSIFT)” as introduced in [...
Byung-Ho Cha, C. C. Jay Kuo
ISCAS
2008
IEEE
166views Hardware» more  ISCAS 2008»
15 years 10 months ago
Complexity modeling of H.264/AVC CAVLC/UVLC entropy decoders
Abstract— A complexity model for context-based adaptive variable length coding (CAVLC) and universal variable length coding (UVLC) in the H.264/AVC decoder is proposed. CAVLC and...
Szu-Wei Lee, C. C. Jay Kuo
ISM
2008
IEEE
136views Multimedia» more  ISM 2008»
15 years 10 months ago
Multimodal Speaker Segmentation in Presence of Overlapped Speech Segments
We propose a multimodal speaker segmentation algorithm with two main contributions: First, we suggest a hidden Markov model architecture that performs fusion of the three modaliti...
Viktor Rozgic, Kyu Jeong Han, Panayiotis G. Georgi...
PIMRC
2008
IEEE
15 years 10 months ago
Base-station and subcarrier assignment in two-cell OFDMA downlink under QoS fairness
Abstract— Consider the problem of base-station and subcarrier assignment on the downlink of a two-cell OFDMA system with adaptive modulation. The aim is to maximize a common data...
Ayman Alsawah, Inbar Fijalkow
« Prev « First page 1195 / 1479 Last » Next »