Sciweavers

2499 search results - page 151 / 500
» The Serializability of Network Codes
Sort
View
EJC
2008
14 years 8 months ago
Locating sensors in paths and cycles: The case of 2-identifying codes
For a graph G and a set D V (G), define Nr[x] = {xi V (G) : d(x, xi) r} (where d(x, y) is graph theoretic distance) and Dr(x) = Nr[x] D. D is known as an r-identifying code if...
David L. Roberts, Fred S. Roberts
80
Voted
VTC
2010
IEEE
129views Communications» more  VTC 2010»
14 years 8 months ago
A Near-Capacity Differentially Encoded Non-Coherent Adaptive Multiple-Symbol-Detection Aided Three-Stage Coded Scheme
Abstract—This paper presents an Irregular Distributed Hybrid Concatenated Differential (Ir-DHCD) coding scheme contrived for the relayaided differential decode-and-forward (DDF) ...
Li Wang, Lingkun Kong, Soon Xin Ng, Lajos Hanzo
93
Voted
IWCMC
2009
ACM
15 years 4 months ago
On the capacity of BICM with QAM constellations
Abstract—In this tutorial paper we analyze the capacity of bitinterleaved coded modulation (BICM) with quadrature amplitude modulation (QAM) constellations, and we pay special at...
Alex Alvarado, Erik Agrell, Arne Svensson
AINA
2006
IEEE
15 years 4 months ago
Remote Trust with Aspect-Oriented Programming
Given a client/server application, how can the server entrust the integrity of the remote client, albeit the latter is running on an un-trusted machine? To address this research p...
Paolo Falcarin, Riccardo Scandariato, Mario Baldi
VTC
2006
IEEE
106views Communications» more  VTC 2006»
15 years 4 months ago
Rate Regions of Asymmetrical Multiple Access with Receive Diversity
— Based on the specification of a high-throughput wireless local area network system we consider the achievable rate regions of time, frequency and code division multiple access...
Thomas Deckert, Sebastian Kaiser, Gerhard Fettweis