Sciweavers

CCECE
2009
IEEE
14 years 6 months ago
Application layer optimization for efficient video streaming over IEEE 802.11 based wireless networks
— Most of the existing video streaming systems employ the worst case analysis in application layer buffer size dimensioning. Even though the worst case buffer size dimensioning p...
Azfar Moid, Abraham O. Fapojuwo
CCECE
2009
IEEE
14 years 6 months ago
A grainless semantics for the HARPO/L language
This paper presents a dynamic semantics for the parallel language HARPO/L, based on Reynolds’s grainless approach [1]. It shows that the approach scales to somewhat more sophist...
Theodore S. Norvell
CCECE
2009
IEEE
14 years 6 months ago
The second-order monostatic HF radar cross section incorporating antenna barge motion
The second-order HF radar ocean cross section is derived for the case of the transmitting and receiving antenna undergoing platform (i.e. barge) motion. The derivation for electro...
John Walsh, Weimin Huang, Eric Gill
CCECE
2009
IEEE
14 years 6 months ago
Downlink transmitter adaptation based on greedy SINR maximization
In this paper we present algorithms for transmitter adaptation in downlink wireless systems based on maximization of the Signal-to-Interference plus Noise-Ratio (SINR). We investi...
Dimitrie C. Popescu, Shiny Abraham, Otilia Popescu
CCECE
2009
IEEE
14 years 6 months ago
On the second-order cyclostationarity for joint signal detection and classification in cognitive radio systems
—Spectrum awareness is a crucial first step of a cognitive radio (CR). This provides information necessary for the CR to adapt to the radio frequency environment, and involves re...
Qiyun Zhang, Octavia A. Dobre, Sreeraman Rajan, Ro...
CCECE
2009
IEEE
14 years 6 months ago
An ultra compact block cipher for serialized architecture implementations
In this paper, we present a new block cipher, referred as PUFFIN2, that is designed to be used with applications requiring very low circuit area. PUFFIN2 is designed to be impleme...
Cheng Wang, Howard M. Heys
CCECE
2009
IEEE
14 years 6 months ago
Inverse data transformation for change detection in wind turbine diagnostics
A complex system is expected to show different nominal behaviors under different conditions, and the deviation over time from these nominal behaviors is an indicator of potential ...
Yanjun Yan, Lisa Ann Osadciw, Glen Benson, Eric Wh...
CCECE
2009
IEEE
14 years 6 months ago
Estimation of boundary properties using stochastic differential equations
The inverse diffusion problems deal with the estimation of many crucial parameters such as the diffusion coefficient, source properties, and boundary conditions. Such algorithms ...
Ashraf Atalla, Aleksandar Jeremic
CCECE
2009
IEEE
14 years 6 months ago
Design and implementation of a low-power workstation
A workstation requires a low-power design similar to a typical PC. In this paper we propose several strategies to reduce the power consumption of a workstation. First, we must com...
Ying-Wen Bai, Chun-Yang Tsai
CCECE
2009
IEEE
14 years 6 months ago
A distributed and cooperative supervisory estimation of multi-agent systems - Part I: Framework
Abstract—In this work, we propose a framework for supervisory cooperative estimation of multi-agent linear time-invariant (LTI) systems. We introduce a group of sub-observers, ea...
Seyyedmohsen Azizi, Mani M. Tousi, Kash Khorasani