Sciweavers

1448 search results - page 35 / 290
» From Requirements to Code Revisited
Sort
View
CORR
2006
Springer
92views Education» more  CORR 2006»
13 years 7 months ago
Myopic Coding in Wireless Networks
Abstract -We investigate the achievable rate of data transmission from sources to sinks through a multiple-relay network. We study achievable rates for omniscient coding, in which ...
Lawrence Ong, Mehul Motani
SIGOPSE
2004
ACM
14 years 1 months ago
A sledgehammer approach to reuse of legacy device drivers
Device drivers account for the majority of an operating system’s code base, and reuse of the existing driver infrastructure is a pragmatic requirement of any new OS project. New...
Joshua LeVasseur, Volkmar Uhlig
ISCAS
2005
IEEE
197views Hardware» more  ISCAS 2005»
14 years 1 months ago
Averaging attack resilient video fingerprinting
— This paper addresses an effective technique for digital fingerprinting for video. While orthogonal modulation technique is a straightforward and widely used method for digital ...
In Koo Kang, Choong-Hoon Lee, Hae-Yeoun Lee, Jong-...
TWC
2008
99views more  TWC 2008»
13 years 7 months ago
MAP-Based Code-Aided Hypothesis Testing
This contribution deals with code-aided hypothesis testing for wireless digital receivers. We provide a theoretical justification for a hypothesis testing algorithm that was previo...
Cédric Herzet, Henk Wymeersch, Frederik Sim...
ISVLSI
2007
IEEE
139views VLSI» more  ISVLSI 2007»
14 years 1 months ago
Automatic Retargeting of Binary Utilities for Embedded Code Generation
Contemporary SoC design involves the proper selection of cores from a reference platform. Such selection implies the design exploration of alternative CPUs, which requires the gen...
Alexandro Baldassin, Paulo Centoducatte, Sandro Ri...