• Aucun résultat trouvé

[PDF] Top 20 Memory Consumption Analysis for the GOE and PET Unequal Erasure Protection Schemes

Has 10000 "Memory Consumption Analysis for the GOE and PET Unequal Erasure Protection Schemes" found on our website. Below are the top 20 most common "Memory Consumption Analysis for the GOE and PET Unequal Erasure Protection Schemes".

Memory Consumption Analysis for the GOE and PET Unequal Erasure Protection Schemes

Memory Consumption Analysis for the GOE and PET Unequal Erasure Protection Schemes

... Abstract—Unequal Erasure Protection (UEP) is an attractive approach to protect data flows that contain information of different priority ...levels. The various solutions that have been ... Voir le document complet

7

Unequal Erasure Protection and Object Bundle Protection with the Generalized Object Encoding Approach

Unequal Erasure Protection and Object Bundle Protection with the Generalized Object Encoding Approach

... an unequal protection where the high priority data benets from a higher protection than the rest of ...on the erasure channel", for instance the ... Voir le document complet

29

On-the-fly erasure coding for real-time video applications

On-the-fly erasure coding for real-time video applications

... In the presence of VBR sources as video, this behavior is furthermore confirmed as FEC schemes lack adaptability compared to ...waiting for the reception of (at least) the same number ... Voir le document complet

16

Evaluation of Sybil Attacks Protection Schemes in KAD

Evaluation of Sybil Attacks Protection Schemes in KAD

... only the first Sybil enters the routing table, the other KADIDs presenting the same IP address can not ...address. The graph 5 shows that Sybils with spoofed IP addresses totally break ... Voir le document complet

14

RS + LDPC-Staircase Codes for the Erasure Channel: Standards, Usage and Performance

RS + LDPC-Staircase Codes for the Erasure Channel: Standards, Usage and Performance

... improved the LDPC-Staircase codec ...use the SGE approach introduced simultaneously by LaMacchia/Odlyzko [16] and Pomerance/Smith ...using the high speed IT decoding even when no weight one ... Voir le document complet

8

Contributions to the Performance Analysis of Intervehicular Communications Systems and Schemes

Contributions to the Performance Analysis of Intervehicular Communications Systems and Schemes

... diversity schemes, cooperative spectrum ...reported the importance of using cognitive radio in vehicular networks as a candidate solution for spectrum scarcity, and various techniques have ... Voir le document complet

132

Analysis and algorithms for partial protection in mesh networks

Analysis and algorithms for partial protection in mesh networks

... between the source and destination, and let pi be the cost of the i th ...in the beginning of the section, by treating the N paths in the general mesh ... Voir le document complet

6

Pollution, Unequal Lifetimes and Fairness

Pollution, Unequal Lifetimes and Fairness

... characterizes the optimal level of pollution in a two-period OLG economy where pol- lution deteriorates survival ...on the one hand, the average utilitarian optimum, where the long-run average ... Voir le document complet

32

A Fine-grained Approach for Power Consumption Analysis and Prediction

A Fine-grained Approach for Power Consumption Analysis and Prediction

... Approach for Power Consumption Analysis and Prediction 3 ...power and heat constraints [1]. For decades, computers got faster by increasing the speed of the central ... Voir le document complet

13

The Mojette Erasure Code for Distributed File Systems

The Mojette Erasure Code for Distributed File Systems

... L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignemen[r] ... Voir le document complet

3

Unequal longevities and lifestyles transmission

Unequal longevities and lifestyles transmission

... study the optimal taxation policy in an econ- omy where unequal longevities result from di¤erences in lifestyles, and where the composition of the population into di¤erent lifestyles is ... Voir le document complet

31

High Efficiency Protection Solution for Off-Chip Memory in Embedded Systems

High Efficiency Protection Solution for Off-Chip Memory in Embedded Systems

... of the art 2.1 Threat model As described in [3], the external memory of an embed- ded system can face a variety of attacks, including those involving probing of the bus between a processor ... Voir le document complet

8

Analysis of numerical schemes for semiconductors energy-transport models

Analysis of numerical schemes for semiconductors energy-transport models

... volume schemes for unipolar energy-transport models are ...show the decay of a discrete entropy with control of the discrete entropy ...to the existence of a solution to the ... Voir le document complet

35

Analysis of numerical schemes for semiconductors energy-transport models

Analysis of numerical schemes for semiconductors energy-transport models

... ensure the Newton method convergence, the time step may be adapted, as explained in Section ...records the number of Newton iterations (including iterations for which the Newton method ... Voir le document complet

35

Queueing Analysis of Simple FEC Schemes for IP Telephony

Queueing Analysis of Simple FEC Schemes for IP Telephony

... Queueing Analysis of Simple FEC Schemes for IP Telephony Eitan Altman, Chadi Barakat, Victor Manuel Ramos Ramos.. To cite this version: Eitan Altman, Chadi Barakat, Victor Manuel Ramos R[r] ... Voir le document complet

38

Factor analysis of dynamic PET images

Factor analysis of dynamic PET images

... factor analysis The first generation is mainly based on apex-seeking and SVD for extraction of principal components or ...component analysis for quantitative evaluation on medical ... Voir le document complet

229

Analysis of Quasi-Cyclic LDPC codes under ML decoding over the erasure channel

Analysis of Quasi-Cyclic LDPC codes under ML decoding over the erasure channel

... POSITION AND RELATED WORKS In modern communication systems, data is often transmitted as independent ...on the retransmission of lost packets are possible (ARQ, Automatic Repeat Requests), they are not ... Voir le document complet

7

Unmixing dynamic PET images for voxel-based kinetic component analysis

Unmixing dynamic PET images for voxel-based kinetic component analysis

... data analysis techniques have been considered in the literature, such as clustering, principal component analysis (PCA), independent component analysis (ICA) and non-negative matrix ... Voir le document complet

13

Utilitarianism and unequal longevities: A remedy?

Utilitarianism and unequal longevities: A remedy?

... on the one hand, one life of x periods, and, on the other hand, x lives of one ...i.e. the law of declining marginal utility of consumption per period - holds, it is always optimal, ... Voir le document complet

40

Analysis and synthesis of randomized modulation schemes for power converters

Analysis and synthesis of randomized modulation schemes for power converters

... “Analysis and Synthesis of Randomized Modulation Schemes for Power Converters.” IEEE Trans.. © Copyright 1995 IEEE[r] ... Voir le document complet

15

Show all 10000 documents...