Sciweavers

44 search results - page 5 / 9
» Constructing Good Covering Codes for Applications in Stegano...
Sort
View
ECCC
2006
134views more  ECCC 2006»
13 years 7 months ago
Derandomizing the AW matrix-valued Chernoff bound using pessimistic estimators and applications
Ahlswede and Winter [AW02] introduced a Chernoff bound for matrix-valued random variables, which is a non-trivial generalization of the usual Chernoff bound for real-valued random...
Avi Wigderson, David Xiao
ICMCS
2007
IEEE
79views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Pop Music Beat Detection in the Huffman Coded Domain
This paper presents a novel beat detector that operates in the Huffman coded domain of a MP3 audio bitstream. We seek to answer two main questions. First, whether it is possible t...
Jia Zhu, Ye Wang
INFOCOM
2000
IEEE
14 years 2 days ago
Adaptive Two-Level Unequal Error Protection Convolutional Code Scheme for Wireless ATM Networks
Abstract—Because the wireless asynchronous transfer mode (ATM) networks are often constrained with the limited link bandwidth and error prone characteristics, forward error corre...
Zhenqiang Sun, Shigetomo Kimura, Yoshihiko Ebihara
SIGCSE
1999
ACM
93views Education» more  SIGCSE 1999»
14 years 6 hour ago
Patterns for decoupling data structures and algorithms
In order to build a data structure that is extensible and reusable, it is necessary to decouple the intrinsic and primitive behavior of the structure from the application specific...
Dung Zung Nguyen, Stephen B. Wong
AINA
2009
IEEE
14 years 2 months ago
Predictive Simulation of HPC Applications
The architectures which support modern supercomputing machinery are as diverse today, as at any point during the last twenty years. The variety of processor core arrangements, thr...
Simon D. Hammond, J. A. Smith, Gihan R. Mudalige, ...