-
The Generalized Reed-Muller codes and the radical powers of a modular algebra
First, a new proof of Berman and Charpin's characterization of the Reed-Muller codes over the binary field or over an arbitrary prime field is presented. These codes are considered as the powers of the radical of a modular algeb ... Read More >
-
Combining Maps and Street Level Images for Building Height and Facade Estimation
We propose a method that integrates two widely available data sources, building footprints from 2D maps and street level images, to derive valuable information that is generally difficult to acquire -- building heights and build ... Read More >
-
A Method for RFO Estimation Using Phase Analysis of Pilot Symbols in OFDM System ...
In this paper, a method for CFO/RFO estimation based on proportional coefficients extraction in OFDM system is proposed, which may be applied to any pilot symbol pattern. Read More >
-
Edge coloring in unstructured CFD codes
We propose a way of preventing race conditions in the evaluation of the surface integral contribution in discontinuous Galerkin and finite volume flow solvers by coloring the edges (or faces) of the computational mesh. In this w ... Read More >
-
Gondola: a Parametric Robot Infrastructure for Repeatable Mobile Experiments
When deploying a testbed infrastructure for Wireless Sensor Networks (WSNs), one of the most challenging feature is to provide repeatable mobility. Wheeled robots, usually employed for such tasks, strive to adapt to the wide ran ... Read More >
-
A First Attempt to Cloud-Based User Verification in Distributed System
In this paper, the idea of client verification in distributed systems is presented. The proposed solution presents a sample system where client verification through cloud resources using input signature is discussed. For differe ... Read More >
-
Wireless distance estimation with low-power standard components in wireless sens ...
In the context of increasing use of moving wireless sensor nodes the interest in localizing these nodes in their application environment is strongly rising. For many applications, it is necessary to know the exact position of th ... Read More >
-
Co-Occurrence Patterns in the Voynich Manuscript
The Voynich Manuscript is a medieval book written in an unknown script. This paper studies the distribution of similarly spelled words in the Voynich Manuscript. It shows that the distribution of words within the manuscript is n ... Read More >
-
Object-oriented Packet Caching for ICN
One of the most discussed features offered by Information-centric Networking (ICN) architectures is the ability to support packet-level caching at every node in the network. By individually naming each packet, ICN allows routers ... Read More >
-
A Workflow for Fast Evaluation of Mapping Heuristics Targeting Cloud Infrastruct ...
Resource allocation is today an integral part of cloud infrastructures management to efficiently exploit resources. Cloud infrastructures centers generally use custom built heuristics to define the resource allocations. It is an ... Read More >