Sciweavers

1379 search results - page 101 / 276
» codes 2009
Sort
View
ISPEC
2011
Springer
14 years 7 months ago
Traitor Tracing against Public Collaboration
Abstract. Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel. Traitor tracing is needed because some ...
Xingwen Zhao, Fangguo Zhang
ICASSP
2009
IEEE
15 years 2 months ago
Log-likelihood ratio clipping in MIMO-BICM systems: Information geometric analysis and impact on system capacity
The clipping of log-likelihood ratios (LLRs) in soft demodulators for multiple-input multiple-output (MIMO) systems with bitinterleaved coded modulation (BICM) was recently observ...
Stefan Schwandter, Peter Fertl, Clemens Novak, Ger...
IGARSS
2009
15 years 2 months ago
The Use of ORFEO ToolBox in the Context of Map Updating
This paper presents experiments with the ORFEO ToolBox (OTB) developed by the CNES in the context of the Brussels project ARMURS about map updating. Depending on the availability ...
Christophe Simler, Charles Beumier, Christine Leig...
ICSE
2009
IEEE-ACM
15 years 11 months ago
ClemanX: Incremental clone detection tool for evolving software
Recent research results have shown more benefits of the management of code clones, rather than detecting and removing them. However, existing clone management approaches are stil...
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...
ICASSP
2009
IEEE
15 years 11 months ago
Modeling of contours in wavelet domain for generalized lifting image compression
This paper introduces the design of context-based models of contours in the wavelet domain, which are used to construct generalized lifting (GL) mappings for image compression. Th...
Julio C. Rolon, Antonio Ortega, Philippe Salembier