• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,552
Next 10 →

Iterative decoding of binary block and convolutional codes

by Joachim Hagenauer, Elke Offer, Lutz Papke - IEEE TRANS. INFORM. THEORY , 1996
"... Iterative decoding of two-dimensional systematic convolutional codes has been termed “turbo” (de)coding. Using log-likelihood algebra, we show that any decoder can he used which accepts soft inputs-including a priori values-and delivers soft outputs that can he split into three terms: the soft chann ..."
Abstract - Cited by 610 (43 self) - Add to MetaCart
Iterative decoding of two-dimensional systematic convolutional codes has been termed “turbo” (de)coding. Using log-likelihood algebra, we show that any decoder can he used which accepts soft inputs-including a priori values-and delivers soft outputs that can he split into three terms: the soft

Cooperative strategies and capacity theorems for relay networks

by Gerhard Kramer, Michael Gastpar, Piyush Gupta - IEEE TRANS. INFORM. THEORY , 2005
"... Coding strategies that exploit node cooperation are developed for relay networks. Two basic schemes are studied: the relays decode-and-forward the source message to the destination, or they compress-and-forward their channel outputs to the destination. The decode-and-forward scheme is a variant of ..."
Abstract - Cited by 739 (19 self) - Add to MetaCart
of multihopping, but in addition to having the relays successively decode the message, the transmitters cooperate and each receiver uses several or all of its past channel output blocks to decode. For the compress-and-forward scheme, the relays take advantage of the statistical dependence between their channel

Labeling Images with a Computer Game

by Luis Von Ahn , 2004
"... We introduce a new interactive system: a game that is fun and can be used to create valuable output. When people play the game they help determine the contents of images by providing meaningful labels for them. If the game is played as much as popular online games, we estimate that most images on ..."
Abstract - Cited by 773 (11 self) - Add to MetaCart
We introduce a new interactive system: a game that is fun and can be used to create valuable output. When people play the game they help determine the contents of images by providing meaningful labels for them. If the game is played as much as popular online games, we estimate that most images

Achieving 100% Throughput in an Input-Queued Switch

by Nick McKeown, Adisak Mekkittikul, Venkat Anantharam, Jean Walrand - IEEE TRANSACTIONS ON COMMUNICATIONS , 1996
"... It is well known that head-of-line (HOL) blocking limits the throughput of an input-queued switch with FIFO queues. Under certain conditions, the throughput can be shown to be limited to approximately 58%. It is also known that if non-FIFO queueing policies are used, the throughput can be increas ..."
Abstract - Cited by 527 (27 self) - Add to MetaCart
It is well known that head-of-line (HOL) blocking limits the throughput of an input-queued switch with FIFO queues. Under certain conditions, the throughput can be shown to be limited to approximately 58%. It is also known that if non-FIFO queueing policies are used, the throughput can

The NIST Advanced Encryption Standard (AES) Input and Output Block Conventions Input and Output Block Conventions for AES Encryption Algorithms

by B. R. Gladman
"... 1. Cryptographic algorithms operate in computer memory and transform memory blocks for inputs, outputs and keys. When these values need to be calculated consistently in many different processor ..."
Abstract - Add to MetaCart
1. Cryptographic algorithms operate in computer memory and transform memory blocks for inputs, outputs and keys. When these values need to be calculated consistently in many different processor

Low Complexity Soft-Input Soft-Output Block Decision Feedback Equalization

by Jingxian Wu, Yahong R. Zheng , 2008
"... A low complexity soft-input soft-output (SISO) block decision feedback equalizer (BDFE) is presented for turbo equalization. The proposed method employs a sub-optimum sequence-based detection, where the soft-output of the equalizer is calculated by evaluating an approximation of the sequence-based ..."
Abstract - Add to MetaCart
A low complexity soft-input soft-output (SISO) block decision feedback equalizer (BDFE) is presented for turbo equalization. The proposed method employs a sub-optimum sequence-based detection, where the soft-output of the equalizer is calculated by evaluating an approximation of the sequence

The iSLIP Scheduling Algorithm for Input-Queued Switches

by Nick McKeown , 1999
"... An increasing number of high performance internetworking protocol routers, LAN and asynchronous transfer mode (ATM) switches use a switched backplane based on a crossbar switch. Most often, these systems use input queues to hold packets waiting to traverse the switching fabric. It is well known th ..."
Abstract - Cited by 425 (8 self) - Add to MetaCart
that if simple first in first out (FIFO) input queues are used to hold packets then, even under benign conditions, head-of-line (HOL) blocking limits the achievable bandwidth to approximately 58.6 % of the maximum. HOL blocking can be overcome by the use of virtual output queueing, which is described

Zero-forcing methods for downlink spatial multiplexing in multiuser MIMO channels

by Quentin H. Spencer, A. Lee Swindlehurst, Martin Haardt - IEEE TRANS. SIGNAL PROCESSING , 2004
"... The use of space-division multiple access (SDMA) in the downlink of a multiuser multiple-input, multiple-output (MIMO) wireless communications network can provide a substantial gain in system throughput. The challenge in such multiuser systems is designing transmit vectors while considering the co-c ..."
Abstract - Cited by 371 (29 self) - Add to MetaCart
The use of space-division multiple access (SDMA) in the downlink of a multiuser multiple-input, multiple-output (MIMO) wireless communications network can provide a substantial gain in system throughput. The challenge in such multiuser systems is designing transmit vectors while considering the co

The RC5 Encryption Algorithm

by Ronald L. Rivest , 1995
"... Abstract. This document describes the RC5 encryption algorithm. RC5 is a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data-dependent rotations. RC5 has a variable word size, a variable number of rounds, and a variable-lengt ..."
Abstract - Cited by 363 (7 self) - Add to MetaCart
-word (64-bit) input (plaintext) and output (ciphertext) block sizes. RC5 uses an \expanded key table, " S, derived from the user's supplied secret key. The size t of table S depends on the number r of rounds: S has t =2(r +1) words. There are thus several distinct \RC5 " algorithms

Marginal Likelihood From the Metropolis-Hastings Output

by Siddhartha Chib, Ivan Jeliazkov - OUTPUT,JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION , 2001
"... This article provides a framework for estimating the marginal likelihood for the purpose of Bayesian model comparisons. The approach extends and completes the method presented in Chib (1995) by overcoming the problems associated with the presence of intractable full conditional densities. The propos ..."
Abstract - Cited by 217 (16 self) - Add to MetaCart
. The proposed method is developed in the context of MCMC chains produced by the Metropolis–Hastings algorithm, whose building blocks are used both for sampling and marginal likelihood estimation, thus economizing on prerun tuning effort and programming. Experiments involving the logit model for binary data
Next 10 →
Results 1 - 10 of 4,552
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University