Sciweavers

339 search results - page 3 / 68
» An ADC-BiST scheme using sequential code analysis
Sort
View
CAV
2009
Springer
209views Hardware» more  CAV 2009»
14 years 8 months ago
Static and Precise Detection of Concurrency Errors in Systems Code Using SMT Solvers
Context-bounded analysis is an attractive approach to verification of concurrent programs. Bounding the number of contexts executed per thread not only reduces the asymptotic compl...
Shuvendu K. Lahiri, Shaz Qadeer, Zvonimir Rakamari...
TSP
2008
111views more  TSP 2008»
13 years 7 months ago
Coding Schemes for User Cooperation in Low-Power Regimes
We consider the design of cooperation coding schemes for a two-user multi-access channel (MAC). In particular, we consider two block Markov coding schemes, namely, the multiplexed...
Guosen Yue, Xiaodong Wang, Zigui Yang, Anders H&os...
DCC
2009
IEEE
14 years 8 months ago
The Posterior Matching Feedback Scheme for Joint Source-Channel Coding with Bandwidth Expansion
When transmitting a Gaussian source over an AWGN channel with an input power constraint and a quadratic distortion measure, it is well known that optimal performance can be obtain...
Ofer Shayevitz, Meir Feder
MIPS
2004
Springer
121views Multimedia» more  MIPS 2004»
14 years 24 days ago
Analysis of FEC Codes for Partially Reliable Media Broadcasting Schemes
With many multimedia delivery schemes a client does not necessarily receive a given media content entirely (e.g. router congestions can lead some information to be lost). Mechanism...
Christoph Neumann, Vincent Roca
ICIP
2008
IEEE
14 years 9 months ago
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding sche
Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform...
Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunat...