Sciweavers

1038 search results - page 192 / 208
» Code Compression
Sort
View
VTC
2010
IEEE
176views Communications» more  VTC 2010»
13 years 8 months ago
Exploiting Redundancy in Iterative H.264 Joint Source and Channel Decoding For Robust Video Transmission
— In this paper we propose joint optimisation of soft-bit assisted iterative joint source and channel decoding with the aid of our proposed EXIT chart optimised redundant source ...
Nasruminallah, Lajos Hanzo
IJCNN
2007
IEEE
14 years 4 months ago
Default ARTMAP 2
—Default ARTMAP combines winner-take-all category node activation during training, distributed activation during testing, and a set of default parameter values that define a read...
Gregory P. Amis, Gail A. Carpenter
TCSV
2010
13 years 4 months ago
Wireless Video Quality Assessment: A Study of Subjective Scores and Objective Algorithms
Evaluating the perceptual quality of video is of tremendous importance in the design and optimization of wireless video processing and transmission systems. In an endeavor to emula...
Anush K. Moorthy, Kalpana Seshadrinathan, Rajiv So...
VLSISP
2008
173views more  VLSISP 2008»
13 years 9 months ago
Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors
Advanced bit manipulation operations are not efficiently supported by commodity word-oriented microprocessors. Programming tricks are typically devised to shorten the long sequence...
Yedidya Hilewitz, Ruby B. Lee
ACMSE
2006
ACM
14 years 3 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.