Abstract— This paper presents an Interleaver-Division Multiple Access (IDMA) based architecture with single-user decoding using parallel concatenated non-linear trellis codes (PC...
Miguel Griot, Andres I. Vila Casado, Richard D. We...
— We study the downlink coverage of a base station terminal (BST), which has access to a relay node. Continuing a previous study in which the BST is assumed to provide a variable...
This paper investigates asymptotically optimal scalar quantizers to address QIM watermark detection with i.i.d. host data and additive noise. False-alarm probability of detection ...
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
The medial axis of a shape is known to carry a lot of information about it. In particular a recent result of Lieutier establishes that every bounded open subset of Rn has the same...
— Numerous proposals exist for load balancing in peer-to-peer (p2p) networks. Some focus on namespace balancing, making the distance between nodes as uniform as possible. This te...