Sciweavers

221 search results - page 33 / 45
» isca 2008
Sort
View
ISCAS
2008
IEEE
155views Hardware» more  ISCAS 2008»
15 years 4 months ago
Advanced colluder detection techniques for OSIFT-based hiding codes
— In this work, we examine a family of anti-collusion codes using the principle of “Orthogonal Spreading followed by the Inverse Fourier Transform (OSIFT)” as introduced in [...
Byung-Ho Cha, C. C. Jay Kuo
ISCAS
2008
IEEE
139views Hardware» more  ISCAS 2008»
15 years 4 months ago
Missing feature speech recognition in a meeting situation with maximum SNR beamforming
Abstract— Especially for tasks like automatic meeting transcription, it would be useful to automatically recognize speech also while multiple speakers are talking simultaneously....
Dorothea Kolossa, Shoko Araki, Marc Delcroix, Tomo...
ISCAS
2008
IEEE
135views Hardware» more  ISCAS 2008»
15 years 4 months ago
Semi-blind channel estimation of MIMO-OFDM systems with pulse shaping
Abstract— Most of the existing MIMO-OFDM channel estimation methods do not take into account the effect of the pulseshaping filter in the transmitter nor of the matched filter ...
Feng Wan, Wei-Ping Zhu, M. N. S. Swamy
ISCAS
2008
IEEE
103views Hardware» more  ISCAS 2008»
15 years 4 months ago
Watermarking curves using 2D mesh spectral transform
— This paper presents a robust watermarking method for curves that uses informed-detection. To embed watermarks, the presented algorithm parameterizes a curve using the B-spline ...
Ji Young Kim, Dong-Hyuck Im, Hae-Yeoun Lee, Heung-...
ISCAS
2008
IEEE
166views Hardware» more  ISCAS 2008»
15 years 4 months ago
Complexity modeling of H.264/AVC CAVLC/UVLC entropy decoders
Abstract— A complexity model for context-based adaptive variable length coding (CAVLC) and universal variable length coding (UVLC) in the H.264/AVC decoder is proposed. CAVLC and...
Szu-Wei Lee, C. C. Jay Kuo