Sciweavers

5054 search results - page 971 / 1011
» simulation 2008
Sort
View
ICASSP
2008
IEEE
14 years 2 months ago
An information theoretic approach to processing management
In region surveillance applications, sensors oftentimes accumulate an overwhelmingly large amount of data, making it infeasible to process all of the collected data in real-time. ...
Christopher M. Kreucher, Kevin M. Carter
ICC
2008
IEEE
132views Communications» more  ICC 2008»
14 years 2 months ago
Contourlet Based Image Compression for Wireless Communication in Face Recognition System
—This paper proposes to use Contourlet transform for image compression and feature extraction for wireless face recognition system. The properties of face images and face recogni...
Yanjun Yan, Rajani Muraleedharan, Xiang Ye, Lisa A...
ICC
2008
IEEE
167views Communications» more  ICC 2008»
14 years 2 months ago
Traceroute-Based Topology Inference without Network Coordinate Estimation
Abstract— Underlay topology information is important to construct efficient overlay networks. To achieve end-to-end network topology inference among a group of hosts, traceroute...
Xing Jin, Wanqing Tu, S.-H. Gary Chan
ICC
2008
IEEE
141views Communications» more  ICC 2008»
14 years 2 months ago
Multilevel Structured Low-Density Parity-Check Codes
— Low-Density Parity-Check (LDPC) codes are typically characterized by a relatively high-complexity description, since a considerable amount of memory is required in order to sto...
Nicholas Bonello, Sheng Chen, Lajos Hanzo
ICC
2008
IEEE
116views Communications» more  ICC 2008»
14 years 2 months ago
Nonlinear Turbo Codes for Higher-Order Modulations
— In 1982 Ungerboeck presented a set-partitioning design technique for trellis coded modulation (TCM). Although this technique directly assigns constellation points to the branch...
Miguel Griot, Andres I. Vila Casado, Richard D. We...