• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,424
Next 10 →

Noisy Channel

by Rafael E. Banchs, Marta R. Costa-jussà
"... T = argmax P(T|S) = argmax ..."
Abstract - Add to MetaCart
T = argmax P(T|S) = argmax

Rateless codes on noisy channels

by Ravi Palanki, Jonathan S. Yedidia, Ravi Palanki, Jonathan S. Yedidia - in Proc. ISIT , 2004
"... We study the performance of the newly invented rateless codes (LT- and Raptor codes) on noisy channels such as the BSC and the AWGNC. We find that Raptor codes outperform LT codes, and have good performance on a wide variety of noisy channels. ..."
Abstract - Cited by 62 (3 self) - Add to MetaCart
We study the performance of the newly invented rateless codes (LT- and Raptor codes) on noisy channels such as the BSC and the AWGNC. We find that Raptor codes outperform LT codes, and have good performance on a wide variety of noisy channels.

List decoding for noisy channels

by Peter Elias , 1957
"... ..."
Abstract - Cited by 126 (0 self) - Add to MetaCart
Abstract not found

The Noisy Channel and the Braying Donkey

by Roberto Basili, MariaTeresa Pazienza, Maria Teresa Pazienza, Paola Velardi - Proceedings of the ACL Workshop on Combining Symbolic and Statistical Approaches to Language (The Balancing Act , 1994
"... The title of this paper playfully contrasts two rather different approaches to language analysis. The "Noisy Channel" 's are the promoters of statistically based approaches to language learning. Many of these studies are based on the Shannons's Noisy Channel model. The "Bray ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
The title of this paper playfully contrasts two rather different approaches to language analysis. The "Noisy Channel" 's are the promoters of statistically based approaches to language learning. Many of these studies are based on the Shannons's Noisy Channel model. The "

Authentication over noisy channels

by Lifeng Lai, Hesham El Gamal, H. Vincent Poor - IEEE TRANS. INF. THEORY , 2009
"... An authentication counterpart of Wyner’s study of the wiretap channel is developed in this work. More specifically, message authentication over noisy channels is studied while impersonation and substitution attacks are investigated for both single-and multiple-message scenarios. For each scenario, ..."
Abstract - Cited by 18 (1 self) - Add to MetaCart
An authentication counterpart of Wyner’s study of the wiretap channel is developed in this work. More specifically, message authentication over noisy channels is studied while impersonation and substitution attacks are investigated for both single-and multiple-message scenarios. For each scenario

Progressive Image Coding for Noisy Channels

by P. Greg Sherwood, Kenneth Zeger - IEEE SIGNAL PROCESSING LETTERS , 1997
"... We cascade an existing image coder with carefully chosen error control coding, and thus produce a progressive image compression scheme whose performance on a noisy channel is significantly better than that of previously known techniques. The main idea is to trade off the available transmission rate ..."
Abstract - Cited by 148 (9 self) - Add to MetaCart
We cascade an existing image coder with carefully chosen error control coding, and thus produce a progressive image compression scheme whose performance on a noisy channel is significantly better than that of previously known techniques. The main idea is to trade off the available transmission rate

Anonymity protocols as noisy channels

by Konstantinos Chatzikokolakis, Catuscia Palamidessi, Prakash Panangaden - Information and Computation , 2006
"... Abstract. We propose a framework in which anonymity protocols are interpreted as particular kinds of channels, and the degree of anonymity provided by the protocol as the converse of the channel’s capacity. We also investigate how the adversary can test the system to try to infer the user’s identity ..."
Abstract - Cited by 86 (27 self) - Add to MetaCart
Abstract. We propose a framework in which anonymity protocols are interpreted as particular kinds of channels, and the degree of anonymity provided by the protocol as the converse of the channel’s capacity. We also investigate how the adversary can test the system to try to infer the user’s

REDUNDANCY IN QUANTISERS FOR NOISY CHANNELS

by Lachlan L. H. Andrew
"... This p,aper presents a study of the nature of optimal quan-tiser/dequantiser pairs for use with binary symmetric chan-nels with moderate to high error rates. It is well known that some codewords of such quantisers are never output, because there is always another codeword with lower ex-pected distor ..."
Abstract - Add to MetaCart
-pected distortion. This paper investigates how high the bit error rate must be for this phenomenon to occur. It also investigates the nature of optimal quantisers for extremely noisy channels, in which the error probability is almost 1/2. 1.

Control over Noisy Channels

by Sekhar Tatikonda, Sanjoy Mitter - IEEE Transactions on Automatic Control , 2002
"... Communication is an important component of distributed and networked controls systems. In our companion paper we presented a framework for studying control problems with a digital noiseless communication channel connecting the sensor to the controller [TM1]. Here we generalize that framework by appl ..."
Abstract - Cited by 69 (3 self) - Add to MetaCart
Communication is an important component of distributed and networked controls systems. In our companion paper we presented a framework for studying control problems with a digital noiseless communication channel connecting the sensor to the controller [TM1]. Here we generalize that framework

STEGOSYSTEMS BASED ON NOISY CHANNELS

by Valery Korzhik, Guillermo Morales-luna
"... We consider a scenario where an attacker is able to receive a stegosignal only over a noisy channel under the very strong condition that an attacker may know even the cover message (CM). We propose to use spread-time stegosystem (STS) where the embedding of spread signals into the samples of CM is p ..."
Abstract - Add to MetaCart
We consider a scenario where an attacker is able to receive a stegosignal only over a noisy channel under the very strong condition that an attacker may know even the cover message (CM). We propose to use spread-time stegosystem (STS) where the embedding of spread signals into the samples of CM
Next 10 →
Results 1 - 10 of 2,424
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University