Sciweavers

9186 search results - page 1834 / 1838
» A Module System for Scheme
Sort
View
TIP
2010
107views more  TIP 2010»
13 years 2 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
TPDS
2010
154views more  TPDS 2010»
13 years 2 months ago
Adaptive Workload Prediction of Grid Performance in Confidence Windows
Predicting grid performance is a complex task because heterogeneous resource nodes are involved in a distributed environment. Long execution workload on a grid is even harder to pr...
Yongwei Wu, Kai Hwang, Yulai Yuan, Weimin Zheng
TVLSI
2010
13 years 2 months ago
A Low-Power DSP for Wireless Communications
This paper proposes a low-power high-throughput digital signal processor (DSP) for baseband processing in wireless terminals. It builds on our earlier architecture--Signal processi...
Hyunseok Lee, Chaitali Chakrabarti, Trevor N. Mudg...
TWC
2010
13 years 2 months ago
Outage Probability Analysis of Cognitive Transmissions: Impact of Spectrum Sensing Overhead
In cognitive radio networks, a cognitive source node requires two essential phases to complete a cognitive transmission process: the phase of spectrum sensing with a certain time d...
YuLong Zou, Yu-Dong Yao, Baoyu Zheng
TWC
2010
13 years 2 months ago
Robustness analysis and new hybrid algorithm of wideband source localization for acoustic sensor networks
Wideband source localization using acoustic sensor networks has been drawing a lot of research interest recently in wireless communication applications, such as cellular handset lo...
Kun Yan, Hsiao-Chun Wu, S. Sitharama Iyengar
« Prev « First page 1834 / 1838 Last » Next »