Sciweavers

250 search results - page 24 / 50
» Verifying Tolerant Systems Using Polynomial Approximations
Sort
View
VTC
2006
IEEE
174views Communications» more  VTC 2006»
15 years 3 months ago
ML Detection with Blind Linear Prediction for Differential Space-Time Block Code Systems
Abstract— This paper proposes a maximum likelihood detection (MLD) method for the differential space-time block code (DSTBC) in cooperation with blind linear prediction (BLP) of ...
Seree Wanichpakdeedecha, Kazuhiko Fukawa, Hiroshi ...
AUTOMATICA
2006
142views more  AUTOMATICA 2006»
14 years 9 months ago
Stability regions in the parameter space: D-decomposition revisited
The challenging problem in linear control theory is to describe the total set of parameters (controller coefficients or plant characteristics) which provide stability of a system....
Elena N. Gryazina, Boris T. Polyak
ISCAS
2003
IEEE
172views Hardware» more  ISCAS 2003»
15 years 2 months ago
Efficient symbol synchronization techniques using variable FIR or IIR interpolation filters
Maximum Likelihood estimation theory can be used to develop optimal timing recovery schemes for digital communication systems. Tunable digital interpolation filters are commonly ...
Martin Makundi, Timo I. Laakso
JFP
2008
125views more  JFP 2008»
14 years 9 months ago
Types and trace effects of higher order programs
This paper shows how type effect systems can be combined with model-checking techniques to produce powerful, automatically verifiable program logics for higher order programs. The...
Christian Skalka, Scott F. Smith, David Van Horn
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 1 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena