No abstract available.
Cited By
- Ji X, Zhang J, Zou S, Chen Y, Qu G and Xu W (2024). MagView++: Data Exfiltration via CPU Magnetic Signals Under Video Decoding, IEEE Transactions on Mobile Computing, 23:3, (2486-2503), Online publication date: 1-Mar-2024.
- Lajam O and Mohammed S (2024). Optimizing efficiency of P2P content distribution with network coding, Journal of Network and Computer Applications, 223:C, Online publication date: 1-Mar-2024.
- Liu Y, Cai H and Tang X (2023). A New Cooperative Repair Scheme With
k + 1 Helper Nodes for (n ,k ) Hadamard MSR Codes With Small Sub-Packetization, IEEE Transactions on Information Theory, 69:5, (2820-2829), Online publication date: 1-May-2023. - Teeti M (2023). On capacity and performance of noncoherent OFDM-IM systems with binary codes, Digital Signal Processing, 133:C, Online publication date: 1-Mar-2023.
- Abdullahi S, Sun S, Wang Y, Yang P, Wang H and Wang B (2023). A hybrid BTP approach with filtered BCH codes for improved performance and security, Journal of Information Security and Applications, 71:C, Online publication date: 1-Dec-2022.
- Miao S, Rapp L and Schmalen L Error-and-erasure Decoding of Product and Staircase Codes with Simplified Extrinsic Message Passing 2022 IEEE International Symposium on Information Theory (ISIT), (1205-1210)
- Patel M, de Oliveira G and Mutlu O HARP: Practically and Effectively Identifying Uncorrectable Errors in Memory Chips That Use On-Die Error-Correcting Codes MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture, (623-640)
- Dong G, Qing T, Tian L, Du R, Li J and Volchenkov D (2021). Optimization of Crude Oil Trade Structure, Complexity, 2021, Online publication date: 1-Jan-2021.
- Chen Y, Wang S, Li Z and He T (2020). Reliable Physical-Layer Cross-Technology Communication With Emulation Error Correction, IEEE/ACM Transactions on Networking, 28:2, (612-624), Online publication date: 1-Apr-2020.
- Meng P, Tian C and Cheng X (2019). Publicly verifiable and efficiency/security-adjustable outsourcing scheme for solving large-scale modular system of linear equations, Journal of Cloud Computing: Advances, Systems and Applications, 8:1, Online publication date: 27-Dec-2019.
- Cayrel P, Gueye C, Khan J, Klamti J and Persichetti E Improvement of Binary and Non Binary Statistical Decoding Algorithm Information Security and Cryptology – ICISC 2019, (194-207)
- Paul D and Stevanović D (2019). Eigenvector-based identification of bipartite subgraphs, Discrete Applied Mathematics, 269:C, (146-158), Online publication date: 30-Sep-2019.
- Harrison W, Fernandes T, Gomes M and Vilela J (2019). Generating a Binary Symmetric Channel for Wiretap Codes, IEEE Transactions on Information Forensics and Security, 14:8, (2128-2138), Online publication date: 1-Aug-2019.
- Chang L, Chen P, Tan V, Wang C and Han Y (2019). On the Maximum Size of Block Codes Subject to a Distance Criterion, IEEE Transactions on Information Theory, 65:6, (3751-3757), Online publication date: 1-Jun-2019.
- Nahiyan A, Farahmandi F, Mishra P, Forte D and Tehranipoor M (2019). Security-Aware FSM Design Flow for Identifying and Mitigating Vulnerabilities to Fault Attacks, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 38:6, (1003-1016), Online publication date: 1-Jun-2019.
- Mohebbi H (2019). Parallel SIMD CPU and GPU Implementations of Berlekamp---Massey Algorithm and Its Error Correction Application, International Journal of Parallel Programming, 47:1, (137-160), Online publication date: 1-Feb-2019.
- Sohn J, Choi B, Yoon S and Moon J (2018). Capacity of Clustered Distributed Storage, IEEE Transactions on Information Theory, 65:1, (81-107), Online publication date: 1-Jan-2019.
- Gupta A, Yang J and Balakrishnan R Asterisk and Obelisk Proceedings of the 31st Annual ACM Symposium on User Interface Software and Technology, (725-736)
- Liu Z, Mao M, Liu T, Wang X, Wen W, Chen Y, Li H, Wang D, Pei Y and Ge N (2018). TriZone, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 37:10, (1985-1998), Online publication date: 1-Oct-2018.
- Sella O, Moore A and Zilberman N FEC Killed The Cut-Through Switch Proceedings of the 2018 Workshop on Networking for Emerging Applications and Technologies, (15-20)
- Zhang Y, Feng D, Tong W, Hua Y, Liu J, Tan Z, Wang C, Wu B, Li Z and Xu G (2018). CACF, ACM Transactions on Architecture and Code Optimization, 15:2, (1-26), Online publication date: 30-Jun-2018.
- Kadampot I, Tahmasbi M and Bloch M Multilevel-Coded Pulse-Position Modulation for Covert Communications 2018 IEEE International Symposium on Information Theory (ISIT), (1864-1868)
- Kolditz T, Habich D, Lehner W, Werner M and de Bruijn S AHEAD Proceedings of the 2018 International Conference on Management of Data, (1619-1634)
- Hukerikar S, Teranishi K, Diniz P and Lucas R (2018). RedThreads, International Journal of Parallel Programming, 46:2, (225-251), Online publication date: 1-Apr-2018.
- C P and R S (2017). Performance of Concatenated Kernel Code in Cognitive Radio Networks, Procedia Computer Science, 115:C, (330-337), Online publication date: 1-Nov-2017.
- Cohen R, Cassuto Y, Cohen R and Cassuto Y (2017). Coding for Improved Throughput Performance in Network Switches, IEEE/ACM Transactions on Networking, 25:5, (2802-2814), Online publication date: 1-Oct-2017.
- Hukerikar and Engelmann (2017). Resilience Design Patterns, Supercomputing Frontiers and Innovations: an International Journal, 4:3, (4-42), Online publication date: 15-Sep-2017.
- Chen R and Prasanna V Optimal Circuits for Parallel Bit Reversal Proceedings of the 54th Annual Design Automation Conference 2017, (1-6)
- Yudin O, Ziatdinov Y, Voronin A and Ilyenko A (2016). Basic Concepts and Mathematical Aspects in Channel Coding, Cybernetics and Systems Analysis, 52:6, (878-883), Online publication date: 1-Nov-2016.
- Bala Krishna M and Dugar A (2016). Product Authentication Using QR Codes, Wireless Personal Communications: An International Journal, 90:1, (381-398), Online publication date: 1-Sep-2016.
- Farsad N, Yilmaz H, Eckford A, Chae C and Guo W (2016). A Comprehensive Survey of Recent Advancements in Molecular Communication, IEEE Communications Surveys & Tutorials, 18:3, (1887-1919), Online publication date: 1-Jul-2016.
- Blawat M, Gaedke K, Htter I, Chen X, Turczyk B, Inverso S, Pruitt B and Church G (2016). Forward Error Correction for DNA Data Storage, Procedia Computer Science, 80:C, (1011-1022), Online publication date: 1-Jun-2016.
- Berend D, Dolev S, Frenkel S and Hanemann A (2016). Towards holographic "brain" memory based on randomization and Walsh-Hadamard transformation, Neural Networks, 77:C, (87-94), Online publication date: 1-May-2016.
- Abuadbba A, Khalil I, Ibaida A and Atiquzzaman M (2016). Resilient to shared spectrum noise scheme for protecting cognitive radio smart grid readings - BCH based steganographic approach, Ad Hoc Networks, 41:C, (30-46), Online publication date: 1-May-2016.
- Ruan Z, Luo H and Chen Z (2016). Improving reliability of erasure codes-based storage paradigm under correlated failures for wireless sensor networks, International Journal of Communication Systems, 29:5, (992-1011), Online publication date: 25-Mar-2016.
- Wen W, Mao M, Li H, Chen Y, Pei Y and Ge N A holistic tri-region MLC STT-RAM design with combined performance, energy, and reliability optimizations Proceedings of the 2016 Conference on Design, Automation & Test in Europe, (1285-1290)
- Scholl S, Schläfer P and Wehn N Saturated min-sum decoding Proceedings of the 2016 Conference on Design, Automation & Test in Europe, (1219-1224)
- Zhou Q, Mow W, Zhang S and Toumpakaris D (2016). Two-Way Decode-and-Forward for Low-Complexity Wireless Relaying: Selective Forwarding Versus One-Bit Soft Forwarding, IEEE Transactions on Wireless Communications, 15:3, (1866-1880), Online publication date: 1-Mar-2016.
- Wang Y, Narayanan K and Huang Y (2016). Interleaved Concatenations of Polar Codes With BCH and Convolutional Codes, IEEE Journal on Selected Areas in Communications, 34:2, (267-277), Online publication date: 1-Feb-2016.
- Sampaio F, Shafique M, Zatt B, Bampi S and Henkel J Approximation-aware multi-level cells STT-RAM cache architecture Proceedings of the 2015 International Conference on Compilers, Architecture and Synthesis for Embedded Systems, (79-88)
- Miloslavskaya V (2015). Shortened Polar Codes, IEEE Transactions on Information Theory, 61:9, (4852-4865), Online publication date: 1-Sep-2015.
- Luque J, Morón M and Casilari E (2015). A characterization of the performance of Bluetooth 2.x + EDR technology in noisy environments, Wireless Networks, 21:6, (1969-1984), Online publication date: 1-Aug-2015.
- Trifonov P (2015). Low-Complexity Implementation of RAID Based on Reed-Solomon Codes, ACM Transactions on Storage, 11:1, (1-25), Online publication date: 24-Feb-2015.
- Kaltofen E and Pernet C Sparse polynomial interpolation codes and their decoding beyond half the minimum distance Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation, (272-279)
- Feinerman O, Haeupler B and Korman A Breathe before speaking Proceedings of the 2014 ACM symposium on Principles of distributed computing, (114-123)
- Kolditz T, Kissinger T, Schlegel B, Habich D and Lehner W Online bit flip detection for in-memory B-trees on unreliable hardware Proceedings of the Tenth International Workshop on Data Management on New Hardware, (1-9)
- Kang H and Iwamura K Watermarking based on the difference of discrete cosine transform coefficients and an error-correcting code Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, (9-17)
- Wen W, Zhang Y, Mao M and Chen Y State-Restrict MLC STT-RAM Designs for High-Reliable High-Performance Memory System Proceedings of the 51st Annual Design Automation Conference, (1-6)
- Arbuckle T, Hogan D and Ryan C (2014). Learning predictors for flash memory endurance, International Journal of Computational Intelligence Studies, 3:1, (18-39), Online publication date: 1-Jan-2014.
- Wen W, Mao M, Zhu X, Kang S, Wang D and Chen Y CD-ECC Proceedings of the International Conference on Computer-Aided Design, (1-8)
- Mandel T and Mache J Practical error correction for resource-constrained wireless networks Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, (1-14)
- Tomic R Optimal networks from error correcting codes Proceedings of the ninth ACM/IEEE symposium on Architectures for networking and communications systems, (169-180)
- Olberding S, Gong N, Tiab J, Paradiso J and Steimle J A cuttable multi-touch sensor Proceedings of the 26th annual ACM symposium on User interface software and technology, (245-254)
- Chang Y, Yang M, Kuo T and Hwang R (2013). A reliability enhancement design under the flash translation layer for MLC-based flash-memory storage systems, ACM Transactions on Embedded Computing Systems, 13:1, (1-28), Online publication date: 1-Aug-2013.
- Huang F, Luo W, Huang J and Shi Y Distortion function designing for JPEG steganography with uncompressed side-image Proceedings of the first ACM workshop on Information hiding and multimedia security, (69-76)
- Imamverdiyev Y, Teoh A and Kim J (2013). Biometric cryptosystem based on discretized fingerprint texture descriptors, Expert Systems with Applications: An International Journal, 40:5, (1888-1901), Online publication date: 1-Apr-2013.
- Esposito C, Cotroneo D and Russo S (2013). Survey On reliability in publish/subscribe services, Computer Networks: The International Journal of Computer and Telecommunications Networking, 57:5, (1318-1343), Online publication date: 1-Apr-2013.
- Hwang Y, Choi B and Jeon M (2013). On the construction of stabilizer codes with an arbitrary binary matrix, Quantum Information Processing, 12:1, (467-479), Online publication date: 1-Jan-2013.
- Gill A, Bull T, Farmer A, Kimmell G and Komp E (2012). Types and associated type families for hardware simulation and synthesis, Higher-Order and Symbolic Computation, 25:2-4, (255-274), Online publication date: 1-Dec-2012.
- Cyganek B and Woźniak M Pixel-Based object detection and tracking with ensemble of support vector machines and extended structural tensor Proceedings of the 4th international conference on Computational Collective Intelligence: technologies and applications - Volume Part I, (104-113)
- Nakazawa A and Nitschke C Point of Gaze Estimation through Corneal Surface Reflection in an Active Illumination Environment Proceedings, Part II, of the 12th European Conference on Computer Vision --- ECCV 2012 - Volume 7573, (159-172)
- Liu B, Chen X and Teshome F (2012). Resilient and adaptive performance logic, ACM Journal on Emerging Technologies in Computing Systems, 8:3, (1-16), Online publication date: 1-Aug-2012.
- Comer M, Kaltofen E and Pernet C Sparse polynomial interpolation and Berlekamp/Massey algorithms that correct outlier errors in input values Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation, (138-145)
- Esposito C A tutorial on reliability in publish/subscribe services Proceedings of the 6th ACM International Conference on Distributed Event-Based Systems, (399-406)
- Li P, Yang X, Qiao H, Cao K, Liu E and Tian J (2012). An effective biometric cryptosystem combining fingerprints with error correction codes, Expert Systems with Applications: An International Journal, 39:7, (6562-6574), Online publication date: 1-Jun-2012.
- Lee C, Lee C and Kim C (2012). An MMSE approach to nonlocal image denoising, Journal of Visual Communication and Image Representation, 23:3, (476-490), Online publication date: 1-Apr-2012.
- Yang L, Chen Q, Tian J and Wu D (2012). Robust track-and-trace video watermarking, Security and Communication Networks, 5:4, (353-363), Online publication date: 1-Apr-2012.
- Vitkovskiy A, Soteriou V and Nicopoulos C A highly robust distributed fault-tolerant routing algorithm for NoCs with localized rerouting Proceedings of the 2012 Interconnection Network Architecture: On-Chip, Multi-Chip Workshop, (29-32)
- Katiyar A and Jagannatham A Bayesian data and channel joint maximum-likelihood based error correction in wireless sensor networks Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, (141-146)
- García-Herrero F, Valls J and Meher P (2011). High-Speed RS(255, 239) Decoder Based on LCC Decoding, Circuits, Systems, and Signal Processing, 30:6, (1643-1669), Online publication date: 1-Dec-2011.
- Liu H, Chou Y, Lin C and Jiang J Towards completely automatic decoder synthesis Proceedings of the International Conference on Computer-Aided Design, (389-395)
- Little M Mathematical foundations of nonlinear, non-Gaussian, and time-varying digital speech signal processing Proceedings of the 5th international conference on Advances in nonlinear speech processing, (9-16)
- Gill A and Farmer A Deriving an efficient FPGA implementation of a low density parity check forward error corrector Proceedings of the 16th ACM SIGPLAN international conference on Functional programming, (209-220)
- Gill A and Farmer A (2011). Deriving an efficient FPGA implementation of a low density parity check forward error corrector, ACM SIGPLAN Notices, 46:9, (209-220), Online publication date: 18-Sep-2011.
- Hsu P, Chang Y, Huang P, Kuo T and Du D A version-based strategy for reliability enhancement of flash file systems Proceedings of the 48th Design Automation Conference, (29-34)
- Plank J, Buchsbaum A and Vander Zanden B (2011). Minimum density RAID-6 codes, ACM Transactions on Storage, 6:4, (1-22), Online publication date: 1-May-2011.
- Yu T, Wang H and Liu H Denoising of time domain responses in wireless sensor network for the structural health monitoring of transportation infrastructure Proceedings of the 44th Annual Simulation Symposium, (183-187)
- Liaskovitis P and Schurgers C (2011). Efficient Sensing Topology Management for Spatial Monitoring with Sensor Networks, Journal of Signal Processing Systems, 62:3, (415-426), Online publication date: 1-Mar-2011.
- Bastian M, Gunther J and Moon T (2011). A simplified natural gradient learning algorithm, Advances in Artificial Neural Systems, 2011, (1-9), Online publication date: 1-Jan-2011.
- Ruiz C FPGA prototyping of neuro-adaptive decoder Proceedings of the 9th WSEAS international conference on computational intelligence, man-machine systems and cybernetics, (99-104)
- Miller T, Thomas R, Dinan J, Adcock B and Teodorescu R Parichute Proceedings of the 2010 43rd Annual IEEE/ACM International Symposium on Microarchitecture, (351-362)
- Nergui M, Acharya U, Acharya U R and Yu W (2010). Reliable and Robust Transmission and Storage Techniques for Medical Images with Patient Information, Journal of Medical Systems, 34:6, (1129-1139), Online publication date: 1-Dec-2010.
- Chang Y and Kuo T A reliable MTD design for MLC flash-memory storage systems Proceedings of the tenth ACM international conference on Embedded software, (179-188)
- Bulan O, Sharma G and Monga V (2010). Orientation modulation for data hiding in clustered-dot halftone prints, IEEE Transactions on Image Processing, 19:8, (2070-2084), Online publication date: 1-Aug-2010.
- Wang Q, Peng J, Kan H and Xue X (2010). Constructions of cryptographically significant boolean functions using primitive polynomials, IEEE Transactions on Information Theory, 56:6, (3048-3053), Online publication date: 1-Jun-2010.
- Addesso P, Bruno L and Restaino R Adaptive localization techniques in WiFi environments Proceedings of the 5th IEEE international conference on Wireless pervasive computing, (289-294)
- Rodrigues I and Sanches J Photoblinking/photobleaching differential equation model for intensity decay of fluorescence microscopy images Proceedings of the 2010 IEEE international conference on Biomedical imaging: from nano to Macro, (1265-1268)
- Sanches J, Sousa I and Figueiredo P Bayesian fisher information criterion for sampling optimization in ASL-MRI Proceedings of the 2010 IEEE international conference on Biomedical imaging: from nano to Macro, (880-883)
- Wrulich M, Mehlführer C and Rupp M (2010). Managing the interference structure of MIMO HSDPA, IEEE Transactions on Wireless Communications, 9:4, (1472-1482), Online publication date: 1-Apr-2010.
- Batista E, Tobias O and Seara R (2010). A sparse-interpolated scheme for implementing adaptive volterra filters, IEEE Transactions on Signal Processing, 58:4, (2022-2035), Online publication date: 1-Apr-2010.
- Han Y, Omiwade S and Zheng R Survivable distributed storage with progressive decoding Proceedings of the 29th conference on Information communications, (431-435)
- Simoens S, Muñoz-Medina O, Vidal J and Del Coso A (2010). Compress-and-forward cooperative MIMO relaying with full channel state information, IEEE Transactions on Signal Processing, 58:2, (781-791), Online publication date: 1-Feb-2010.
- Rodrigues I and Sanches J Fluorescence microscopy imaging denoising with log-Euclidean priors and photobleaching compensation Proceedings of the 16th IEEE international conference on Image processing, (809-812)
- Moon T, Monroe D, Orekhov A and Gunther J A soft-input adaptive equalizer algorithm Proceedings of the 43rd Asilomar conference on Signals, systems and computers, (655-659)
- Lu H, Plataniotis K and Venetsanopoulos A (2009). Uncorrelated multilinear principal component analysis for unsupervised multilinear subspace learning, IEEE Transactions on Neural Networks, 20:11, (1820-1836), Online publication date: 1-Nov-2009.
- Liu J, Zakharov Y and Weaver B (2009). Architecture and FPGA design of dichotomous coordinate descent algorithms, IEEE Transactions on Circuits and Systems Part I: Regular Papers, 56:11, (2425-2438), Online publication date: 1-Nov-2009.
- Zhou X, Ma J, Li G, Kwon Y and Soong A (2009). Probability-based optimization of inter-sensing duration and power control in cognitive radio, IEEE Transactions on Wireless Communications, 8:10, (4922-4927), Online publication date: 1-Oct-2009.
- Gill A, Bull T, Kimmell G, Perrins E, Komp E and Werling B Introducing Kansas lava Proceedings of the 21st international conference on Implementation and application of functional languages, (18-35)
- Wijnholds S and Van Der Veen A (2009). Multisource self-calibration for sensor arrays, IEEE Transactions on Signal Processing, 57:9, (3512-3522), Online publication date: 1-Sep-2009.
- Parakh A and Kak S (2009). Online data storage using implicit security, Information Sciences: an International Journal, 179:19, (3323-3331), Online publication date: 1-Sep-2009.
- Karapantazis S and Pavlidou F (2009). VoIP, Computer Networks: The International Journal of Computer and Telecommunications Networking, 53:12, (2050-2090), Online publication date: 1-Aug-2009.
- Kim S and Yoo C (2009). Underdetermined blind source separation based on subspace representation, IEEE Transactions on Signal Processing, 57:7, (2604-2614), Online publication date: 1-Jul-2009.
- Lunglmayr M, Berkmann J and Huemer M Vertex packing decoding Proceedings of the 2009 IEEE international conference on Communications, (1876-1881)
- Harrison W and McLaughlin S Physical-layer security Proceedings of the 2009 IEEE international conference on Communications, (1833-1837)
- Villien C and Ostertag E (2009). A polynomial approximation algorithm for real-time maximum-likelihood estimation, IEEE Transactions on Signal Processing, 57:6, (2085-2095), Online publication date: 1-Jun-2009.
- Ramkumar B (2009). Automatic modulation classification for cognitive radios using cyclic feature detection, IEEE Circuits and Systems Magazine, 09:2, (27-45), Online publication date: 1-Jun-2009.
- Ho C Analysis of threshold of regular and irregular LDPC codes using Gaussian approximation Proceedings of the 2009 conference on Wireless Telecommunications Symposium, (16-22)
- Liaskovitis P and Schurgers C Energy efficient min-max spatial monitoring with wireless sensor networks Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (2496-2501)
- Davies M, Lambotharan S, Foster J, Chambers J and McWhirter J Polynomial matrix QR decomposition and iterative decoding of frequency selective MIMO channels Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (128-133)
- Cabuk S, Brodley C and Shields C (2009). IP Covert Channel Detection, ACM Transactions on Information and System Security, 12:4, (1-29), Online publication date: 1-Apr-2009.
- Lanuzza M, Zicari P, Frustaci F, Perri S and Corsonello P An Efficient and Low-Cost Design Methodology to Improve SRAM-Based FPGA Robustness in Space and Avionics Applications Proceedings of the 5th International Workshop on Reconfigurable Computing: Architectures, Tools and Applications, (74-84)
- Carrasco-Alvarez R, Parra-Michel R, Orozco-Lugo A and Tugnait J (2009). Enhanced channel estimation using superimposed training based on universal basis expansion, IEEE Transactions on Signal Processing, 57:3, (1217-1222), Online publication date: 1-Mar-2009.
- Bikhazi N, Jensen M and Anderson A (2009). MIMO signaling over the MMF optical broadcast channel with square-law detection, IEEE Transactions on Communications, 57:3, (614-617), Online publication date: 1-Mar-2009.
- Lu H, Plataniotis K and Venetsanopoulos A (2009). Uncorrelated multilinear discriminant analysis with regularization and aggregation for tensor object recognition, IEEE Transactions on Neural Networks, 20:1, (103-123), Online publication date: 1-Jan-2009.
- Chen H and Schober R (2009). Cyclic space-frequency filtering for BICM-OFDM systems with multiple co–located or distributed transmit antennas, IEEE Transactions on Wireless Communications, 8:1, (336-346), Online publication date: 1-Jan-2009.
- Chaari L, Fourati M, Masmoudi N and Kamoun L (2008). Image transmission quality analysis over adaptive BCH coding, WSEAS TRANSACTIONS on COMMUNICATIONS, 7:6, (584-593), Online publication date: 1-Jun-2008.
- Plank J The RAID-6 liberation codes Proceedings of the 6th USENIX Conference on File and Storage Technologies, (1-14)
- Wu W (2008). Two blind adaptive mobile receivers in time-hopping PAM UWB impulse radio system, EURASIP Journal on Wireless Communications and Networking, 2008, (1-9), Online publication date: 1-Jan-2008.
- Tartary C, Wang H and Pieprzyk J An hybrid approach for efficient multicast stream authentication over unsecured channels Proceedings of the 1st international conference on Provable security, (17-34)
- Han B and Keleher P Implementation and performance evaluation of fuzzy file block matching 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference, (1-6)
- Alaiz-Rodríguez R, Guerrero-Curieses A and Cid-Sueiro J (2007). Minimax Regret Classifier for Imprecise Class Distributions, The Journal of Machine Learning Research, 8, (103-130), Online publication date: 1-May-2007.
- Lunglmayr M and Berkmann J Optimized mapping schemes for LDPC coded higher order modulated QAM transmission Proceedings of the 11th international conference on Computer aided systems theory, (952-959)
- Coon J and Sandell M (2007). Constrained optimization of MIMO training sequences, EURASIP Journal on Advances in Signal Processing, 2007:1, (47-47), Online publication date: 1-Jan-2007.
- Choi H and Bae H (2007). Subband affine projection algorithm for acoustic echo cancellation system, EURASIP Journal on Advances in Signal Processing, 2007:1, (146-146), Online publication date: 1-Jan-2007.
- Peters J, Vijayakumar S and Schaal S Natural actor-critic Proceedings of the 16th European conference on Machine Learning, (280-291)
- Yoon H, Yang K and Shahabi C (2005). Feature Subset Selection and Feature Ranking for Multivariate Time Series, IEEE Transactions on Knowledge and Data Engineering, 17:9, (1186-1198), Online publication date: 1-Sep-2005.
- Yang K and Shahabi C A PCA-based similarity measure for multivariate time series Proceedings of the 2nd ACM international workshop on Multimedia databases, (65-74)
- Cheng W, Chu W and Wu J Semantic context detection based on hierarchical audio models Proceedings of the 5th ACM SIGMM international workshop on Multimedia information retrieval, (109-115)
- Ben-Arie J, Wang Z, Pandit P and Rajaram S (2002). Human Activity Recognition Using Multidimensional Indexing, IEEE Transactions on Pattern Analysis and Machine Intelligence, 24:8, (1091-1104), Online publication date: 1-Aug-2002.
- Zhou L and Ohashi Y Hybrid precoding with data stream adaptation for high throughput mmWave MIMO systems 2016 IEEE Wireless Communications and Networking Conference, (1-6)
- Tsimbalo E, Fafoutis X and Piechocki R CRC error correction for energy-constrained transmission 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), (430-434)
- Yan K, Wu H, Zhou H and Xiao H Novel M-ary coded modulation scheme based on constellation subset selection 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), (207-211)
- Ellingson S and Buehrer R Frequency channel delay modulation for interference-robust low data rate communication MILCOM 2016 - 2016 IEEE Military Communications Conference, (672-677)
- Pinyoanuntapong K, Goswami M, Habib A, Kwon H and Khanh Pham Boundaries of signal-to-noise ratio for adaptive code modulations MILCOM 2016 - 2016 IEEE Military Communications Conference, (132-137)
- Paludi F, Morera D, Goette T, Schnidrig M, Ramos F and Hueda M Low-complexity turbo product code for high-speed fiber-optic systems based on expurgated BCH codes 2016 IEEE International Symposium on Circuits and Systems (ISCAS), (429-432)
- Searle H, Gomes M, Vilela J and Harrison W Irregular Quadrature Amplitude Modulation for Adaptive Physical-Layer Security 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
- Chou S, Chang Y, Yuan-Hung Kua , Huang P and Tsao C Multi-version checkpointing for flash file systems 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), (436-443)
Index Terms
- Error Correction Coding: Mathematical Methods and Algorithms
Recommendations
Error resilient coding and error concealment in scalable video coding
Scalable video coding (SVC), which is the scalable extension of the H.264/AVC standard, was developed by the Joint Video Team (JVT) of ISO/IEC MPEG (Moving Picture Experts Group) and ITU-T VCEG (Video Coding Experts Group). SVC is designed to provide ...
Video error correction using steganography
The transmission of any data is always subject to corruption due to errors, but video transmission, because of its real time nature must deal with these errors without retransmission of the corrupted data. The error can be handled using forward error ...
Video error correction using steganography
Emerging applications of multimedia data hidingThe transmission of any data is always subject to corruption due to errors, but video transmission, because of its real time nature must deal with these errors without retransmission of the corrupted data. The error can be handled using forward error ...