Sciweavers

1270 search results - page 115 / 254
» Improving Code Density Using Compression Techniques
Sort
View
IEEEIAS
2009
IEEE
14 years 4 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
TIT
2008
129views more  TIT 2008»
13 years 10 months ago
Serial Schedules for Belief-Propagation: Analysis of Convergence Time
Abstract--Low-Density Parity-Check (LDPC) codes are usually decoded by running an iterative belief-propagation algorithm over the factor graph of the code. In the traditional messa...
Jacob Goldberger, Haggai Kfir
EJASP
2010
234views more  EJASP 2010»
13 years 5 months ago
Iterative Sparse Channel Estimation and Decoding for Underwater MIMO-OFDM
In this paper we propose a block-by-block iterative receiver for underwater MIMO-OFDM that couples channel estimation with MIMO detection and channel decoding. In particular, the c...
Jie Huang, Jianzhong Huang, Christian R. Berger, S...
SLIP
2003
ACM
14 years 3 months ago
Perimeter-degree: a priori metric for directly measuring and homogenizing interconnection complexity in multilevel placement
In this paper, we describe an accurate metric (perimeter-degree) for measuring interconnection complexity and effective use of it for controlling congestion in a multilevel framew...
Navaratnasothie Selvakkumaran, Phiroze N. Parakh, ...
CHI
2008
ACM
14 years 10 months ago
Ninja cursors: using multiple cursors to assist target acquisition on large screens
We propose the "ninja cursor" to improve the performance of target acquisition, particularly on large screens. This technique uses multiple distributed cursors to reduce...
Masatomo Kobayashi, Takeo Igarashi