Sciweavers

2499 search results - page 125 / 500
» The Serializability of Network Codes
Sort
View
WCNC
2008
IEEE
15 years 4 months ago
Two-Stage Code Acquisition Employing Search Space Reduction and Iterative Detection in the DS-UWB Downlink
— In this paper we propose and investigate an iterative code acquisition scheme assisted by both search space reduction and iterative Massage Passing (MP), which was designed for...
Seung Hwan Won, Lajos Hanzo
ICMCS
2007
IEEE
149views Multimedia» more  ICMCS 2007»
15 years 4 months ago
Joint Source Coding and Data Rate Adaptation for Multi-User Wireless Video Transmission
Much attention has been paid to the problem of optimally utilizing resources such as spectrum, power and time in order to achieve the best video delivery quality in wireless commu...
Fan Zhai, Zhu Li, Aggelos K. Katsaggelos
DSN
2007
IEEE
15 years 4 months ago
An Architectural Approach to Preventing Code Injection Attacks
Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the NX-bit and PaX have been useful in limiting the a...
Ryan Riley, Xuxian Jiang, Dongyan Xu
DSN
2009
IEEE
15 years 1 months ago
An efficient XOR-scheduling algorithm for erasure codes encoding
In large storage systems, it is crucial to protect data from loss due to failures. Erasure codes lay the foundation of this protection, enabling systems to reconstruct lost data w...
Jianqiang Luo, Lihao Xu, James S. Plank
ISCAS
2006
IEEE
100views Hardware» more  ISCAS 2006»
15 years 4 months ago
Decoders for low-density parity-check convolutional codes with large memory
— Low-density parity-check convolutional codes offer the same good error-correcting performance as low-density parity-check block codes while having the ability to encode and dec...
Stephen Bates, L. Gunthorpe, Ali Emre Pusane, Zhen...