Sciweavers

72 search results - page 14 / 15
» The Dispersion of Lossy Source Coding
Sort
View
CONEXT
2008
ACM
13 years 7 months ago
High-throughput, reliable multicast without "crying babies" in wireless mesh networks
There are two primary challenges to supportinghigh-throughput, reliable multicast in wireless mesh networks (WMNs). The first is no different from unicast: wireless links are inhe...
Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun ...
ICIP
2002
IEEE
14 years 7 months ago
Optimal protection assignment for scalable compressed images
This paper is concerned with the efficient transmission of scalable compressed images over lossy communication channels. Recent works have proposed several strategies for assignin...
Johnson Thie, David Taubman
TIT
2010
153views Education» more  TIT 2010»
13 years 10 days ago
On the information rates of the plenoptic function
The plenoptic function (Adelson and Bergen, 91) describes the visual information available to an observer at any point in space and time. Samples of the plenoptic function (POF) a...
Arthur L. da Cunha, Minh N. Do, Martin Vetterli
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
14 years 6 months ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu
SCFBM
2008
101views more  SCFBM 2008»
13 years 5 months ago
The MERG Suite: Tools for discovering competencies and associated learning resources
Background: As the demands for competency-based education grow, the need for standardsbased tools to allow for publishing and discovery of competency-based learning content is mor...
Ravi Teja Bhupatiraju, William R. Hersh, Valerie S...