Sciweavers

5355 search results - page 9 / 1071
» Modules
Sort
View
ICASSP
2008
IEEE
14 years 1 months ago
Modulation forensics for wireless digital communications
Modulation forensics is to detect the modulation type in wireless communications without any prior information. It nds both military and civilian applications such as surveillance...
W. Sabrina Lin, K. J. Ray Liu
ISCAS
2007
IEEE
84views Hardware» more  ISCAS 2007»
14 years 1 months ago
Blue-Noise Sigma-Delta Modulator: Improving Substrate Noise and Nonlinear Amplifier Gain Effects
— This paper presents a method to reduce the effects of substrate noise and nonlinear amplifier gain on sigma-delta (Σ∆) modulators through the use of blue-noise modulation. I...
Eric C. Moule, Zeljko Ignjatovic
ICDCS
2003
IEEE
14 years 24 days ago
Dynamic Module Replacement in Distributed Protocols
Dynamic module replacement — the ability to hot swap a component’s implementation at runtime — is fundamental to supporting evolutionary change in long-lived and highlyavail...
Nigamanth Sridhar, Scott M. Pike, Bruce W. Weide
VTS
2002
IEEE
162views Hardware» more  VTS 2002»
14 years 12 days ago
Self-Testing Second-Order Delta-Sigma Modulators Using Digital Stimulus
Single-bit second-order delta-sigma modulators are commonly used in high-resolution ADCs. Testing this type of modulator requires a high-resolution test stimulus, which is diffic...
Chee-Kian Ong, Kwang-Ting (Tim) Cheng
ACSAC
2004
IEEE
13 years 11 months ago
Detecting Exploit Code Execution in Loadable Kernel Modules
In current extensible monolithic operating systems, loadable kernel modules (LKM) have unrestricted access to all portions of kernel memory and I/O space. As a result, kernel-modu...
Haizhi Xu, Wenliang Du, Steve J. Chapin