Sciweavers

3107 search results - page 72 / 622
» Error-Correcting Source Code
Sort
View
IADIS
2008
13 years 9 months ago
Data Mining Applications in Intelligent Integrated Development Environments
Programming and developing of small scale software applications can be accomplished with simple command-line compilers that can be used to compile, test, and execute code generati...
Ali Farahmand Nejad, Shahabedin Bayati, Sadegh Kha...
IJNSEC
2007
118views more  IJNSEC 2007»
13 years 7 months ago
Code-based Ring Signature Scheme
McEliece is one of the oldest known public key cryptosystems, however it was not quite as successful as RSA. One main reason is that it is widely believed that code-based cryptosy...
Dong Zheng, Xiangxue Li, Kefei Chen
SP
2008
IEEE
13 years 7 months ago
Predictable Design of Network-Based Covert Communication Systems
This paper presents a predictable and quantifiable approach to designing a covert communication system capable of effectively exploiting covert channels found in the various layer...
Ronald William Smith, George Scott Knight
ICMCS
2006
IEEE
93views Multimedia» more  ICMCS 2006»
14 years 1 months ago
A New Joint Source-Channel Modeling Approach for Adaptive FEC Code Rate Decision
We propose a joint source-channel modeling approach for adaptively determining the quality-optimal FEC code rate. Our objective is to obtain the optimal video quality in the recei...
Yo-Won Jeong, Jae Kwon, Jae-kyoon Kim, Kyu Ho Park
WCNC
2008
IEEE
14 years 2 months ago
Asymptotic Distortion Performance of Source-Channel Diversity Schemes over Relay Channels
— Diversity techniques are an effective answer to the challenges presented by fading channels. This paper focuses on studying the performance of systems with diversity of three f...
Karim G. Seddik, Andres Kwasinski, K. J. Ray Liu