Sciweavers

1448 search results - page 35 / 290
» From Requirements to Code Revisited
Sort
View
99
Voted
CORR
2006
Springer
92views Education» more  CORR 2006»
15 years 3 months ago
Myopic Coding in Wireless Networks
Abstract -We investigate the achievable rate of data transmission from sources to sinks through a multiple-relay network. We study achievable rates for omniscient coding, in which ...
Lawrence Ong, Mehul Motani
115
Voted
SIGOPSE
2004
ACM
15 years 9 months ago
A sledgehammer approach to reuse of legacy device drivers
Device drivers account for the majority of an operating system’s code base, and reuse of the existing driver infrastructure is a pragmatic requirement of any new OS project. New...
Joshua LeVasseur, Volkmar Uhlig
142
Voted
ISCAS
2005
IEEE
197views Hardware» more  ISCAS 2005»
15 years 9 months ago
Averaging attack resilient video fingerprinting
— This paper addresses an effective technique for digital fingerprinting for video. While orthogonal modulation technique is a straightforward and widely used method for digital ...
In Koo Kang, Choong-Hoon Lee, Hae-Yeoun Lee, Jong-...
TWC
2008
99views more  TWC 2008»
15 years 3 months ago
MAP-Based Code-Aided Hypothesis Testing
This contribution deals with code-aided hypothesis testing for wireless digital receivers. We provide a theoretical justification for a hypothesis testing algorithm that was previo...
Cédric Herzet, Henk Wymeersch, Frederik Sim...
ISVLSI
2007
IEEE
139views VLSI» more  ISVLSI 2007»
15 years 10 months ago
Automatic Retargeting of Binary Utilities for Embedded Code Generation
Contemporary SoC design involves the proper selection of cores from a reference platform. Such selection implies the design exploration of alternative CPUs, which requires the gen...
Alexandro Baldassin, Paulo Centoducatte, Sandro Ri...