Sciweavers

368 search results - page 30 / 74
» The Information Lost in Erasures
Sort
View
DATE
2009
IEEE
180views Hardware» more  DATE 2009»
14 years 3 months ago
FSAF: File system aware flash translation layer for NAND Flash Memories
NAND Flash Memories require Garbage Collection (GC) and Wear Leveling (WL) operations to be carried out by Flash Translation Layers (FTLs) that oversee flash management. Owing to ...
Sai Krishna Mylavarapu, Siddharth Choudhuri, Avira...
VTC
2007
IEEE
106views Communications» more  VTC 2007»
14 years 2 months ago
Analysis and Design of Dirty Paper Coding by Transformation of Noise
— We design a coding scheme for Costa’s dirty paper coding (DPC) [6] using a channel and a shaping code. We show that by transforming the channel noise distribution the DPC cha...
Young-Seung Lee, Sae-Young Chung
IH
2007
Springer
14 years 2 months ago
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis
Abstract. A new, simple, approach for active steganography is proposed in this paper that can successfully resist recent blind steganalysis methods, in addition to surviving distor...
Kaushal Solanki, Anindya Sarkar, B. S. Manjunath
INFOSCALE
2006
ACM
14 years 2 months ago
Adaptive content management in structured P2P communities
A fundamental paradigm in P2P is that of a large community of intermittently-connected nodes that cooperate to share files. Because nodes are intermittently connected, the P2P co...
Jussi Kangasharju, Keith W. Ross, David A. Turner
TIT
1998
70views more  TIT 1998»
13 years 8 months ago
Reduced-Redundancy Product Codes for Burst Error Correction
In a typical burst-error correction application of a product code of nv nh arrays, one uses an [nh; nh rh] code Ch that detects corrupted rows, and an [nv; nv rv] code Cv that is...
Ron M. Roth, Gadiel Seroussi