Sciweavers

509 search results - page 82 / 102
» icassp 2008
Sort
View
ICASSP
2008
IEEE
15 years 4 months ago
Audio authentication based on distributed source coding
Audio authentication is important in content delivery via untrusted intermediaries, for example peer-to-peer (P2P) file sharing. Many differently encoded versions of the original...
David P. Varodayan, Yao-Chung Lin, Bernd Girod
ICASSP
2008
IEEE
15 years 4 months ago
Optimized distributed 2D transforms for irregularly sampled sensor network grids using wavelet lifting
We address the design and optimization of an energy-efficient lifting-based 2D transform for wireless sensor networks with irregular spatial sampling. The 2D transform is designe...
Godwin Shen, Antonio Ortega
ICASSP
2008
IEEE
15 years 4 months ago
Utility-based power control for peer-to-peer cognitive radio networks with heterogeneous QoS constraints
Transmit-power control is a critical task in cognitive radio (CR) networks. In the present contribution, adherence to hierarchies between primary and secondary users in a peer-to-...
Nikolaos Gatsis, Antonio G. Marqués, Georgi...
ICASSP
2008
IEEE
15 years 4 months ago
Blind channel shortening in OFDM system using nulltones and cyclic prefix
This paper considers the problem of blind channel shortening in OFDM systems. Standard OFDM systems use guard interval (GI) in form of cyclic prefix (CP) and nulltones (NT) redun...
Taoufik Ben Jabeur, Karim Abed-Meraim, Hatem Bouje...
ICASSP
2008
IEEE
15 years 4 months ago
Blind maximum-likelihood data recovery in OFDM
OFDM modulation combines the advantages of high achievable rates and relatively easy implementation. In this paper, we show how to perform blind maximum-likelihood data recovery i...
T. Y. Al-Naffouri, Ahmed Abdul Quadeer