Sciweavers

3356 search results - page 159 / 672
» Determining Consensus Numbers
Sort
View
CISS
2007
IEEE
14 years 4 months ago
The Capacity of Noncoherent Continuous-Phase Frequency Shift Keying
Abstract—Capacity analysis is used to determine the fundamental tradeoff between power and spectral efficiency for coded continuous-phase frequency shift keying (CPFSK). The mod...
Shi Cheng, Rohit Iyer Seshadri, Matthew C. Valenti...
ICC
2007
IEEE
14 years 4 months ago
Detecting Node Misbehavior in Ad hoc Networks
—Ad hoc networks employ a decentralized unstructured networking model that relies on node cooperation for key network functionalities such as routing and medium access. In this p...
M. Tamer Refaei, Yanxia Rong, Luiz A. DaSilva, Hye...
VTC
2007
IEEE
14 years 4 months ago
Distance Spectrum Calculation of Symbol Punctured Trellis Coded Modulation
— A special kind of symbol-wise puncturing is applied to the code symbols of a constituent trellis coded modulation (TCM) within two very bandwidth-efficient concatenated coding...
Axel Hof
WECWIS
2007
IEEE
143views ECommerce» more  WECWIS 2007»
14 years 4 months ago
Semantic Web-Service Discovery and Composition Using Flexible Parameter Matching
When there are a large number of web services available and no single service satisfies the given request, one has to compose multiple web services to fulfill the goal, considerin...
Seog-Chan Oh, Jung-Woon Yoo, Hyunyoung Kil, Dongwo...
IWANN
2007
Springer
14 years 4 months ago
Advantages of Using Feature Selection Techniques on Steganalysis Schemes
Abstract. Steganalysis consists in classifying documents as steganographied or genuine. This paper presents a methodology for steganalysis based on a set of 193 features with two m...
Yoan Miche, Patrick Bas, Amaury Lendasse, Christia...