Sciweavers

534 search results - page 81 / 107
» Proving Termination of Rewrite Systems Using Bounds
Sort
View
ICC
2007
IEEE
107views Communications» more  ICC 2007»
14 years 3 months ago
Error Floors of LDPC Coded BICM
Abstract— In recent years performance prediction for communication systems utilizing iteratively decodable codes has been of considerable interest. There have been significant b...
Aditya Ramamoorthy, Nedeljko Varnica
ECRTS
2005
IEEE
14 years 2 months ago
A Space-Optimal Wait-Free Real-Time Synchronization Protocol
We present a wait-free protocol for the single-writer, multiple-reader problem in small-memory, embedded real-time systems. We analytically establish that our protocol requires le...
Hyeonjoong Cho, Binoy Ravindran, E. Douglas Jensen
SSS
2009
Springer
133views Control Systems» more  SSS 2009»
14 years 1 months ago
A Metastability-Free Multi-synchronous Communication Scheme for SoCs
We propose a communication scheme for GALS systems with independent but approximately synchronized clock sources, which guarantees high-speed metastability-free communication betwe...
Thomas Polzer, Thomas Handl, Andreas Steininger
CDC
2008
IEEE
137views Control Systems» more  CDC 2008»
13 years 10 months ago
Simple coding for achieving mean square stability over bit-rate limited channels
The problem of characterizing lower bounds on data-rates needed for closed loop stability has been solved in a variety of settings. However, the available results lead to coding s...
Eduardo I. Silva, Milan S. Derpich, Jan Øst...
FSTTCS
2003
Springer
14 years 2 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh