Sciweavers

53 search results - page 8 / 11
» The Probe-Insertion Technique for the Detection of Limit Cyc...
Sort
View
VTC
2008
IEEE
117views Communications» more  VTC 2008»
14 years 1 months ago
Design of Rate Constrained Multi-User Receivers for Satellite Communications
—In the realm of satellite communications, one of the great impairments to increase the spectral efficiency is multi-user interference in the reverse link (mobile to satellite). ...
Sami Mekki, Mérouane Debbah
IPPS
2006
IEEE
14 years 22 days ago
Analysis of checksum-based execution schemes for pipelined processors
The performance requirements for contemporary microprocessors are increasing as rapidly as their number of applications grows. By accelerating the clock, performance can be gained...
Bernhard Fechner
IPPS
2010
IEEE
13 years 4 months ago
Runtime checking of serializability in software transactional memory
Abstract--Ensuring the correctness of complex implementations of software transactional memory (STM) is a daunting task. Attempts have been made to formally verify STMs, but these ...
Arnab Sinha, Sharad Malik
JSAC
2008
98views more  JSAC 2008»
13 years 6 months ago
Multiuser Detection of Sparsely Spread CDMA
Code-division multiple access (CDMA) is the basis of a family of advanced air interfaces in current and future generation networks. The benefits promised by CDMA have not been full...
Dongning Guo, Chih-Chun Wang
DSN
2006
IEEE
13 years 10 months ago
Efficient High Hamming Distance CRCs for Embedded Networks
Cyclic redundancy codes (CRCs) are widely used in network transmission and data storage applications because they provide better error detection than lighter weight checksum techn...
Justin Ray, Philip Koopman