• Aucun résultat trouvé

[PDF] Top 20 Dependency-aware unequal erasure protection codes

Has 2888 "Dependency-aware unequal erasure protection codes" found on our website. Below are the top 20 most common "Dependency-aware unequal erasure protection codes".

Dependency-aware unequal erasure protection codes

Dependency-aware unequal erasure protection codes

... Classical unequal erasure protection schemes split the data to be protected into classes which are encoded inde- ...The unequal protection scheme presented in this document is based on ... Voir le document complet

7

Unequal Erasure Protection and Object Bundle Protection with the Generalized Object Encoding Approach

Unequal Erasure Protection and Object Bundle Protection with the Generalized Object Encoding Approach

... AL-FEC codes for the packet erasure channel have been standard- ized during the past few years and included for instance in IPTV or Mobile TV ...Raptor codes [9] (that can be found in several places ... Voir le document complet

29

Bit-Wise Unequal Error Protection for Variable-Length Block Codes With Feedback

Bit-Wise Unequal Error Protection for Variable-Length Block Codes With Feedback

... t M b = M, the input letter r if t M b 6= M. The input letters a and r are described in equation (10). At the end of the control phase, the receiver checks whether or not the output sequence in the control phase is ... Voir le document complet

42

Memory Consumption Analysis for the GOE and PET Unequal Erasure Protection Schemes

Memory Consumption Analysis for the GOE and PET Unequal Erasure Protection Schemes

... NTRODUCTION Unequal Erasure Protection (UEP) is an attractive approach to protect data flows that contain information of different priority ...FEC codes, that map the information ... Voir le document complet

7

Improving the Decoding of LDPC Codes for the Packet Erasure Channel with a Hybrid Zyablov Iterative Decoding/Gaussian Elimination Scheme

Improving the Decoding of LDPC Codes for the Packet Erasure Channel with a Hybrid Zyablov Iterative Decoding/Gaussian Elimination Scheme

... Raptor codes (that are a certain form of LDPC codes) is presented in the following patent description [9] and a similar one for LDPC codes in ... Voir le document complet

20

Discourse dependency structures as DAGs

Discourse dependency structures as DAGs

... 4 Subordinate conjunctions are the only connectives which offer linear order variants: a subordinate clause can be preposed to the main clause. In (Danlos, 2003), I discuss preposed subordinate clauses in detail both at ... Voir le document complet

13

Utilitarianism and unequal longevities: A remedy?

Utilitarianism and unequal longevities: A remedy?

... lucky type-1 agents as, under the compensation, the former end up with a consumption - 2 5 To see this, we simply compute the difference in lifetime utility between the lucky type-2 agen[r] ... Voir le document complet

40

Ultra-fast all-optical self-aware protection switching based on a bistable laser diode

Ultra-fast all-optical self-aware protection switching based on a bistable laser diode

... WL opt can be seen. In Fig. 3, a short frame length of ~100 bits at 10 Gbit/s was chosen in the experiment to ease the visualization of the process on the oscilloscope traces, but the scheme is obviously highly scalable ... Voir le document complet

4

Unequal longevities and lifestyles transmission

Unequal longevities and lifestyles transmission

... Whereas studies on the optimal taxation under endogenous longevity assume a …xed heterogeneity of lifestyles, this paper considers the optimal tax policy in an economy where unequal longevities are the unintended ... Voir le document complet

31

Good coupling between LDPC-Staircase and Reed-Solomon for the design of GLDPC codes for the Erasure Channel

Good coupling between LDPC-Staircase and Reed-Solomon for the design of GLDPC codes for the Erasure Channel

... dimension, K), both schemes perform the same, with results close to that of MDS codes (characterized by an decoding inefficiency ratio always equal to 1). This results holds for the two code rates considered. ... Voir le document complet

7

Unequal societies, Unequal Terms of Trade and Trade Policy

Unequal societies, Unequal Terms of Trade and Trade Policy

... For instance, international exports of luxury goods towards countries such as Brazil and Costa Ricatwo countries with similar income per capita, but dierent degree of inequality are q[r] ... Voir le document complet

16

Application-Aware Protection in DWDM Optical Networks

Application-Aware Protection in DWDM Optical Networks

... path-based protection mechanisms, in this effort we pro- pose to use them ...of protection mechanism will be made according to the user application demand ...link-based protection, whereas other de- ... Voir le document complet

6

Application-Aware Protection in DWDM Optical Networks

Application-Aware Protection in DWDM Optical Networks

... path-based protection is usually more efficient in terms of capacity utilization, as compared to the link-based protection, ...link-based protection is generally more resource-intensive and only ... Voir le document complet

5

Unequal societies, Unequal Terms of Trade and Trade Policy

Unequal societies, Unequal Terms of Trade and Trade Policy

... For instance, international exports of luxury goods towards countries such as Brazil and Costa Ricatwo countries with similar income per capita, but dierent degree of inequality are q[r] ... Voir le document complet

17

Pollution, Unequal Lifetimes and Fairness

Pollution, Unequal Lifetimes and Fairness

... In our model, capital accumulation a¤ects long-run average lifetime welfare not only through its impact on long-run consumption possibilities (as in the standard Golden Rule), but, also,[r] ... Voir le document complet

32

Unequal wages for equal utilities

Unequal wages for equal utilities

... All these results are obtained in a first-best context when there is no asymmetric information that hinders income distribution. However, this is not the most relevant setting to deal with the design of tax policy. The ... Voir le document complet

16

Enhanced Recursive Reed-Muller Erasure Decoding

Enhanced Recursive Reed-Muller Erasure Decoding

... Reed-M¨uller codes on the packet erasure channel is that the traditional decoding algorithm achieving the capacity is based on an inversion (through a Gaussian elimination) of the submatrix of generator ... Voir le document complet

5

ML Dependency Analysis for Assessors

ML Dependency Analysis for Assessors

... our dependency analysis could be used in ...the dependency analysis. We consider that the initial dependency environment contains some primitives like +, -, abs, assert, fst, snd with their usual ... Voir le document complet

16

Authorization policies: Using Decision Support System for context-aware protection of user's private data

Authorization policies: Using Decision Support System for context-aware protection of user's private data

... IV. O UR PROPOSAL As part of the French ANR project INCOME (Multi-Scale Context Management Software Infrastructure for the Internet of Things), we begin to work on an authorization system for ambient system in charge of ... Voir le document complet

7

Authorization policies: Using Decision Support System for context-aware protection of user's private data

Authorization policies: Using Decision Support System for context-aware protection of user's private data

... C. Attribute-based Access Control Roles aren’t always efficient in a dynamic, open and context-aware system to structure authorization policies. A new model based on attributes (ABAC) has been proposed. The ... Voir le document complet

8

Show all 2888 documents...