Sciweavers

1379 search results - page 15 / 276
» codes 2009
Sort
View
ICC
2009
IEEE
120views Communications» more  ICC 2009»
15 years 4 months ago
Optimum TCM Codes Design for Gaussian Channels by Considering Both Euclidean and Hamming Distances
—Trellis-coded modulation (TCM) is an attractive coded modulation technique which yields significant coding gain without bandwidth expansion. So far, researches concerning the o...
Xiao-Xin Zhang, Yuping Zhao, Li Zou
ICASSP
2009
IEEE
15 years 4 months ago
Multiterminal source coding of Bernoulli-Gaussian correlated sources
This paper presents a practical coding scheme for the direct symmetric multiterminal source coding problem with remote source, when the noise between the remote source and the obs...
Francesca Bassi, Michel Kieffer, Çagatay Di...
IH
2010
Springer
14 years 7 months ago
Short Collusion-Secure Fingerprint Codes against Three Pirates
In this article, we propose a new construction of probabilistic collusion-secure fingerprint codes against up to three pirates and give a theoretical security evaluation. Our pira...
Koji Nuida
80
Voted
ICSM
2009
IEEE
15 years 4 months ago
Scalable and incremental clone detection for evolving software
Code clone management has been shown to have several benefits for software developers. When source code evolves, clone management requires a mechanism to efficiently and increme...
Tung Thanh Nguyen, Hoan Anh Nguyen, Jafar M. Al-Ko...
INFOCOM
2009
IEEE
15 years 4 months ago
On Effectiveness of Application-Layer Coding
—The effectiveness of application-layer coding in a system with a large number of users is considered. The end users encode data packets before transmitting them. The effect of a...
Yoojin Choi, Petar Momcilovic