Sciweavers

1066 search results - page 54 / 214
» A Wearable Communication Modulator
Sort
View
ISCAS
2003
IEEE
108views Hardware» more  ISCAS 2003»
14 years 1 months ago
Co-existence of chaos-based and conventional digital communication systems
This paper studies the performance of selected chaos-based communication systems whose spectrum overlaps with that of conventional narrowband systems. Such a scenario may occur in...
Francis Chi-Moon Lau, C. K. Tse
ICONIP
2004
13 years 9 months ago
Genetic Algorithm for Optimal Imperceptibility in Image Communication Through Noisy Channel
Abstract. Data embedding in digital images involves a trade off relationship among imperceptibility, robustness, data security and embedding rate etc. Genetic Algorithms (GA) can b...
Santi P. Maity, Malay Kumar Kundu, Prasanta Kumar ...
SAC
2002
ACM
13 years 7 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
ICMCS
2005
IEEE
109views Multimedia» more  ICMCS 2005»
14 years 1 months ago
An Efficient Architecture for Lifting-Based Forward and Inverse Discrete Wavelet Transform
In this research, an architecture that performs both forward and inverse lifting-based discrete wavelet transform is proposed. The proposed architecture reduces the hardware requi...
S. Mayilavelane Aroutchelvame, Kaamran Raahemifar
CAV
1999
Springer
92views Hardware» more  CAV 1999»
14 years 8 days ago
Latency Insensitive Protocols
The theory of latency insensitive design is presented as the foundation of a new correct by construction methodology to design very large digital systems by assembling blocks of In...
Luca P. Carloni, Kenneth L. McMillan, Alberto L. S...