Sciweavers

603 search results - page 95 / 121
» Embedded Formulas Extraction
Sort
View
DATE
2007
IEEE
142views Hardware» more  DATE 2007»
14 years 1 months ago
Optimizing instruction-set extensible processors under data bandwidth constraints
We present a methodology for generating optimized architectures for data bandwidth constrained extensible processors. We describe a scalable Integer Linear Programming (ILP) formu...
Kubilay Atasu, Robert G. Dimond, Oskar Mencer, Way...
GLOBECOM
2007
IEEE
14 years 1 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
ICC
2007
IEEE
14 years 1 months ago
Constrained Wavelet Tree Quantization for Image Watermarking
This paper investigates the operations of the wavelet tree based quantization and proposes a constrained wavelet tree quantization for image watermarking. The wavelet coefficients ...
Min-Jen Tsai, Chen-Long Lin
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 1 months ago
Pilot-Aided Fine Synchronization for SC-FDE Systems on Multipath Fading Channels
—With single-carrier frequency-domain equalization (SC-FDE), the carrier-frequency offset (CFO) and samplingfrequency offset (SFO) are embedded in the phase rotations of the comp...
Ping-Hung Chiang, Gordon L. Stüber, Ding-Bing...
ICIP
2007
IEEE
14 years 1 months ago
Quality-Aware Video
Recent development in network visual communications has emphasized on the need of objective, reliable and easy-to-use video quality assessment (VQA) systems. This paper introduces...
Basavaraj Hiremath, Qiang Li, Zhou Wang