In region surveillance applications, sensors oftentimes accumulate an overwhelmingly large amount of data, making it infeasible to process all of the collected data in real-time. ...
—This paper proposes to use Contourlet transform for image compression and feature extraction for wireless face recognition system. The properties of face images and face recogni...
Yanjun Yan, Rajani Muraleedharan, Xiang Ye, Lisa A...
Abstract— Underlay topology information is important to construct efficient overlay networks. To achieve end-to-end network topology inference among a group of hosts, traceroute...
— Low-Density Parity-Check (LDPC) codes are typically characterized by a relatively high-complexity description, since a considerable amount of memory is required in order to sto...
— In 1982 Ungerboeck presented a set-partitioning design technique for trellis coded modulation (TCM). Although this technique directly assigns constellation points to the branch...
Miguel Griot, Andres I. Vila Casado, Richard D. We...