Sciweavers

410 search results - page 62 / 82
» Priority Encoding Transmission
Sort
View
VTC
2007
IEEE
108views Communications» more  VTC 2007»
14 years 1 months ago
Joint Optimization of Iterative Source and Channel Decoding Using Over-Complete Source-Mapping
— The intentionally imposed or inherent unintentional residual redundancy found in source encoded bitstreams can be exploited for supporting joint SoftBit-Source Decoding and Cha...
Anh Quang Pham, Lie-Liang Yang, Lajos Hanzo
ESORICS
2007
Springer
14 years 1 months ago
Cloak: A Ten-Fold Way for Reliable Covert Communications
A number of network covert channels have been proposed recently that may have important ramifications for Internet security and privacy. However, they could become ineffective in...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
CORR
2007
Springer
86views Education» more  CORR 2007»
13 years 7 months ago
Variations on Information Embedding in Multiple Access and Broadcast Channels
Information embedding (IE) is the transmission of information within a host signal subject to a distortion constraint. There are two types of embedding methods, namely irreversibl...
Shivaprasad Kotagiri, J. Nicholas Laneman
TIT
2002
118views more  TIT 2002»
13 years 7 months ago
Cayley differential unitary space - Time codes
One method for communicating with multiple antennas is to encode the transmitted data differentially using unitary matrices at the transmitter, and to decode differentially withou...
Babak Hassibi, Bertrand M. Hochwald
GLOBECOM
2008
IEEE
14 years 2 months ago
Distributed Spectrum Allocation of Delay-Sensitive Users over Multi-User Multi-Carrier Networks
—In this paper, we study the distributed spectrum allocation for autonomous users transmitting delay-sensitive information over a wireless multi-carrier network. Because there is...
Wenchi Tu, Mihaela van der Schaar