Sciweavers

336 search results - page 31 / 68
» Source coding and channel requirements for unstable processe...
Sort
View
ICC
2007
IEEE
146views Communications» more  ICC 2007»
14 years 2 months ago
Optimally Mapping an Iterative Channel Decoding Algorithm to a Wireless Sensor Network
–Retransmission based schemes are not suitable for energy constrained wireless sensor networks. Hence, there is an interest in including parity bits in each packet for error cont...
Saad B. Qaisar, Shirish S. Karande, Kiran Misra, H...
ICASSP
2011
IEEE
13 years 6 days ago
A comparative analysis of biometric secret-key binding schemes based on QIM and Wyner-Ziv coding
Biometric secret-key binding inherently requires signal processing and error correction schemes due to noisy measurement readings. Two previously proposed strategies, Quantization...
Aniketh Talwai, Francis Minhthang Bui, Ashish Khis...
SOSP
2007
ACM
14 years 5 months ago
/*icomment: bugs or bad comments?*/
Commenting source code has long been a common practice in software development. Compared to source code, comments are more direct, descriptive and easy-to-understand. Comments and...
Lin Tan, Ding Yuan, Gopal Krishna, Yuanyuan Zhou
ECBS
2004
IEEE
129views Hardware» more  ECBS 2004»
14 years 6 days ago
Using Feature Modeling for Program Comprehension and Software Architecture Recovery
: The available evidence in a legacy software system, which can help in its understanding and recovery of its architecture are not always sufficient. Very often the system's d...
Ilian Pashov, Matthias Riebisch
SIPS
2007
IEEE
14 years 2 months ago
Systematic Luby Transform Codes and Their Soft Decoding
– Luby Transform codes (LT) were originally designed for the Binary Erasure Channel (BEC) encountered owing to randomly dropped packets in the statistical multiplexing aided clas...
Thanh Dang Nguyen, Lie-Liang Yang, Lajos Hanzo