Sciweavers

110 search results - page 14 / 22
» Correlation exploitation in error ranking
Sort
View
VTC
2007
IEEE
108views Communications» more  VTC 2007»
14 years 1 months ago
Joint Optimization of Iterative Source and Channel Decoding Using Over-Complete Source-Mapping
— The intentionally imposed or inherent unintentional residual redundancy found in source encoded bitstreams can be exploited for supporting joint SoftBit-Source Decoding and Cha...
Anh Quang Pham, Lie-Liang Yang, Lajos Hanzo
TCOM
2010
67views more  TCOM 2010»
13 years 6 months ago
Receive antenna selection for unitary space-time modulation over semi-correlated Ricean channels
—Receive antenna selection for unitary space-time modulation (USTM) over semi-correlated Ricean fading channels is analyzed (this work generalizes that of Ma and Tepedelenlio˘gl...
Mahdi Ramezani, Mahdi Hajiaghayi, Chintha Tellambu...
SIGMOD
2004
ACM
154views Database» more  SIGMOD 2004»
14 years 7 months ago
Compressing Historical Information in Sensor Networks
We are inevitably moving into a realm where small and inexpensive wireless devices would be seamlessly embedded in the physical world and form a wireless sensor network in order t...
Antonios Deligiannakis, Yannis Kotidis, Nick Rouss...
BIOCOMP
2010
13 years 4 months ago
Using the Genetic Code Wisdom for Recognizing Protein Coding Sequences
We have elaborated a new method of recognizing protein coding sequences in genomic sequences. The method is exploiting a specific way of genetic code degeneration and relations bet...
Pawel Blazej, Pawel Mackiewicz, Stanislaw Cebrat
ICCAD
2005
IEEE
106views Hardware» more  ICCAD 2005»
14 years 1 months ago
Fast balanced stochastic truncation via a quadratic extension of the alternating direction implicit iteration
— Balanced truncation (BT) model order reduction (MOR) is known for its superior accuracy and computable error bounds. Balanced stochastic truncation (BST) is a particular BT pro...
Ngai Wong, Venkataramanan Balakrishnan