Sciweavers

351 search results - page 23 / 71
» Perfect Constraints Are Tractable
Sort
View
GLOBECOM
2008
IEEE
14 years 2 months ago
Blind Turbo Channel Estimation of QAM Signals Exploiting Code Constraints
—We present a blind turbo equalizer for QAM signals that exploits the statistics that a channel code imposes on the transmitted signal. The receiver is an adaptation of previous ...
André Fonseca dos Santos, Wolfgang Rave, Ge...
RE
2007
Springer
14 years 1 months ago
Choosing a Tram Route: An Experience in Trading-Off Constraints
Trading-off is a familiar element in requirements practice, but it generally assumes a set of independent requirements competing for resources. Choosing a tram route depends inste...
Ian Alexander
IWQOS
2005
Springer
14 years 1 months ago
Overlay Networks with Linear Capacity Constraints
Abstract. Previous work have assumed an independent model for overlay networks: a graph with independent link capacities. We introduce a model of overlays (LCC-overlay) which incor...
Ying Zhu, Baochun Li
NOSSDAV
1995
Springer
13 years 11 months ago
Meeting Arbitrary QoS Constraints Using Dynamic Rate Shaping of Coded Digital Video
Abstract. We introduce the concept of Dynamic Rate Shaping, a technique to adapt the rate ofcompressed video bitstreams MPEG-1, MPEG2, H.261, as well as JPEG to dynamically varyi...
Alexandros Eleftheriadis, Dimitris Anastassiou
DATE
2009
IEEE
116views Hardware» more  DATE 2009»
14 years 2 months ago
Successful attack on an FPGA-based WDDL DES cryptoprocessor without place and route constraints
In this paper, we propose a preprocessing method to improve Side Channel Attacks (SCAs) on Dual-rail with Precharge Logic (DPL) countermeasure family. The strength of our method i...
Laurent Sauvage, Sylvain Guilley, Jean-Luc Danger,...