Abstract—Capacity analysis is used to determine the fundamental tradeoff between power and spectral efficiency for coded continuous-phase frequency shift keying (CPFSK). The mod...
Shi Cheng, Rohit Iyer Seshadri, Matthew C. Valenti...
—Ad hoc networks employ a decentralized unstructured networking model that relies on node cooperation for key network functionalities such as routing and medium access. In this p...
M. Tamer Refaei, Yanxia Rong, Luiz A. DaSilva, Hye...
— A special kind of symbol-wise puncturing is applied to the code symbols of a constituent trellis coded modulation (TCM) within two very bandwidth-efficient concatenated coding...
When there are a large number of web services available and no single service satisfies the given request, one has to compose multiple web services to fulfill the goal, considerin...
Abstract. Steganalysis consists in classifying documents as steganographied or genuine. This paper presents a methodology for steganalysis based on a set of 193 features with two m...
Yoan Miche, Patrick Bas, Amaury Lendasse, Christia...