Sciweavers

4979 search results - page 33 / 996
» Batch codes and their applications
Sort
View
IFIPTCS
2000
15 years 1 months ago
List Decoding: Algorithms and Applications
Over the years coding theory and complexity theory have benefited from a number of mutually enriching connections. This article focuses on a new connection that has emerged betwee...
Madhu Sudan
SOSP
2003
ACM
15 years 6 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
ICIP
2003
IEEE
15 years 11 months ago
Product code error protection of packetized multimedia bitstreams
Sherwood and Zeger proposed a source-channel coding system where the source code is an embedded bitstream and the channel code is a product code such that each row code is a conca...
Vladimir Stankovic, Raouf Hamzaoui, Zixiang Xiong
CORR
2008
Springer
80views Education» more  CORR 2008»
14 years 10 months ago
Reserved-Length Prefix Coding
Huffman coding finds an optimal prefix code for a given probability mass function. Consider situations in which one wishes to find an optimal code with the restriction that all cod...
Michael B. Baer
KDD
2004
ACM
187views Data Mining» more  KDD 2004»
15 years 10 months ago
IMMC: incremental maximum margin criterion
Subspace learning approaches have attracted much attention in academia recently. However, the classical batch algorithms no longer satisfy the applications on streaming data or la...
Jun Yan, Benyu Zhang, Shuicheng Yan, Qiang Yang, H...