Search results

Filter

Filetype

Your search for "*" yielded 528607 hits

BEAST decoding - asymptotic complexity

BEAST is a bidirectional efficient algorithm for searching trees that performs soft-decision maximum-likelihood (ML) decoding of block codes. The decoding complexity of BEAST is significantly reduced compared to the Viterbi algorithm. An analysis of the asymptotic BEAST decoding complexity verifies BEAST's high efficiency compared to other algorithms. The best of the obtained asymptotic upper boun

Social movements, social science and politics : von Stein, Le Bon and two persistent problematiques

The growth of social science and sociology during modernity has always been characterized by a will to create predictability for human actions, under the modern conditions of liberty seen as contingent, unpredictable and unstable. To gain systematic knowledge became a way to solve, counteract or radicalize tensions in society, and thus outweighing the risks of contingency. Furthermore, this develo

Applications of PIXE Analysis in Lund

The facility for PIXE analysis at Department of Nuclear Physics, Lund Institute of Technology, is described and the different fields of application of the PIXE method are briefly presented.

Sövestads kyrka

Report on the medieval parish church of Sövestad in Scania, Sweden. The report is part of a never fullfiled plan of publishing short building archaeological reports on all the medieval churches of the two counties Ljunits and Herrestad at Ystad in Scania as part. The investigation was conducted as a part of the research project "The Cultural Landscape during 6000 years in Southern Sweden", also ca

Combined Test Data Selection and Scheduling for Test Quality Optimization under ATE Memory Depth Constraint

The increasingtest data volume required to ensure high test quality when testinga System-on-Chip is becoming a problem since it (the test datavolume) must fit the ATE (Automatic Test Equipment) memory. In thispaper, we (1) define a test quality metric based on fault coverage,defect probability and number of applied test vectors, and (2) atest data truncation scheme. The truncation scheme combines