Search
Now showing items 31-40 of 47
Rate-Distortion Performance And Complexity Optimized Structured Vector Quantization
(2011-02-09)
Although vector quantization (VQ) is an established topic in communication, its practical utility has been limited due to (i) prohibitive complexity for higher quality and bit-rate, (ii) structured VQ methods which are not ...
Performance Analysis Of Multiuser/Cooperative OFDM Systems With Carrier Frequency And Timing Offsets
(2011-02-03)
Multiuser and cooperative orthogonal frequency division multiplexing(OFDM) systems are being actively researched and adopted in wireless standards, owing to their advantages of robustness to multipath fading, modularity, ...
Spectro-Temporal Features For Robust Automatic Speech Recognition
(2011-01-18)
The speech signal is inherently characterized by its variations in time, which get reflected as variations in frequency. The specto temporal changes are due to changes in vocaltract, intonation, co-articulation and successive ...
Belief Propagation Based Signal Detection In Large-MIMO And UWB Systems
(2011-02-03)
Large-dimensional communication systems are likely to play an important role in modern wireless communications, where dimensions can be in space, time, frequency and their combinations. Large dimensions can bring several ...
Summer-Less Dual Charge Pump Based PLL With Wide Lock Range Using Analog Frequency Detector
(2011-01-18)
Phase Locked Loop (PLL) is an integral component of clock generation circuits. A third order Charge Pump PLL (CPPLL) is most widely employed PLL architecture due to its zero steady state phase error. A monolithic implementation ...
A Workload Based Lookup Table For Minimal Power Operation Under Supply And Body Bias Control
(2011-01-25)
Dynamic Voltage Scaling (DVS) and Adaptive body bias (ABB) techniques respectively try to reduce the dynamic and static power components of an integrated circuit. Ideally, the two techniques can be combined to find the ...
Guessing And Compression : A Large Deviations Approach
(2011-04-01)
The problem of guessing a random string is studied. It arises in the analysis of the strength of secret-key cryptosystems against guessing attacks. Expected number of guesses, or more generally moments of the number of ...

